WO2023058026A1 - Methods and systems of correlating network attacks with network element behavior - Google Patents

Methods and systems of correlating network attacks with network element behavior Download PDF

Info

Publication number
WO2023058026A1
WO2023058026A1 PCT/IL2022/051065 IL2022051065W WO2023058026A1 WO 2023058026 A1 WO2023058026 A1 WO 2023058026A1 IL 2022051065 W IL2022051065 W IL 2022051065W WO 2023058026 A1 WO2023058026 A1 WO 2023058026A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
attack function
correlating
attack
anomalous behavior
Prior art date
Application number
PCT/IL2022/051065
Other languages
French (fr)
Inventor
Alon Ashkenazi
Eugene Shubov
Original Assignee
Cymotive Technologies Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cymotive Technologies Ltd. filed Critical Cymotive Technologies Ltd.
Publication of WO2023058026A1 publication Critical patent/WO2023058026A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Definitions

  • the subject matter herein relates to data capture and data handling techniques.
  • Embodiments of the present disclosure include a method of analyzing the results of one or more network attack functions within a vehicular computing environment including two or more network elements each with at least one known parameter, the method including a) executing one or more network attack functions against two or more known network elements; b) analyzing results of at least one network attack function to identify anomalous behavior of at least one network element; and c) correlating the identified anomalous behavior of the at least one network element with a specific network attack function permutation and with at least one parameter of the specific network element.
  • the one or more network attack functions includes a set of attack function permutations.
  • a network element may include a single device, a plurality of devices, one or more network nodes, one or more databases, one or more lines of computer code, one or more processors, one or more communications elements, or one or more memory elements.
  • the plurality of network elements include simulated network elements that reside on a simulated vehicular computing environment.
  • the plurality of network elements include emulated network elements that reside on an emulated vehicular computing environment. In some embodiments, the plurality of network elements reside on a physical network. In some embodiments, the plurality of network elements reside in a hybrid environment. In some embodiments, the hybrid environment may include at least a combination of at least two of a physical network element, a simulated network element, or an emulated network element.
  • the plurality of network elements includes an infrastructure monitoring service that can interact with one or more network elements.
  • at least one parameter of a specific network element is stored in a database.
  • at least one parameter of a specific network element is used for further system validation.
  • the plurality of network elements includes at least one backend service.
  • the plurality of network elements includes at least one web service. In some embodiments, the plurality of network elements includes at least one mobile device platform. In some embodiments, the plurality of network elements includes at least one messaging service that can interact with one or more network elements. In some embodiments, the plurality of network elements includes a compute service that can interact with one or more network elements.
  • the plurality of network elements includes an authentication service that can interact with one or more network elements.
  • the vehicular computing environment is integrated with an external computing environment.
  • the backend service is a fleet management service.
  • the backend service is hosted by one or more cloud services providers.
  • the backend service is hosted using an on-premises hosting solution. In some embodiments, the backend service is hosted using a combination of one or more cloud service providers and an on-premises hosting solution. In some embodiments, the web service is hosted by one or more cloud services providers. In some embodiments, the web service is hosted using an on-premises hosting solution.
  • the web service is hosted using a combination of one or more cloud service providers and an on-premises hosting solution.
  • the web service includes an API gateway that can interact with one or more network elements.
  • the web service one or more microservices that can interact with one or more network elements.
  • the at least one a mobile device platform includes an iOS application or an Android application.
  • the messaging service includes at least one of a messaging client, persistent connection, a central messaging broker, or a polling interval.
  • the compute service is a serverless compute service that can interact with one or more network elements.
  • the authentication service is a mutual authentication service that can interact with one or more network elements.
  • Embodiments may also include connection with an external computing environment.
  • the external computing environment is part of a developer operations environment associated with continuous integration.
  • the external computing environment is part of a developer operations environment associated with continuous delivery.
  • the external computing environment is part of a developer operations environment associated with continuous deployment.
  • the executed network attack function permutation may include at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an artificial intelligence analysis.
  • the at least one attack function permutation may include a logical addresses for each of the plurality of network elements.
  • the at least one attack function permutation may include at least one characteristic for each of the plurality of network elements. In some embodiments, the at least one attack function permutation may include at least one of a duration of time to form at least one attack function, a predicted run time to execute at least one attack function, a requirement to comply with a performance specification of an attack function, or an attack function network route.
  • the at least one attack function is initiated via a batch process. In some embodiments, the at least one attack function is initiated via a near-real time streaming process. In some embodiments, the at least one attack function utilizes a messaging protocol. In some embodiments, the at least one attack function is targeting a frontend emulator. In some embodiments, the at least one attack function is based at least in part on a previously derived attack function permutation.
  • the at least one attack function is based at least in part on a previously executed attack function permutation. In some embodiments, the at least one attack function permutations may also include one or more attack payloads. In some embodiments, the network attack function was created by an artificial intelligence system. In some embodiments, the at least one executed network attack function is executed against a plurality of network elements at the application layer.
  • the network attack function was created by a human operator. In some embodiments, the network attack function was created by combination of an artificial intelligence system and a human operator. In some embodiments, the network attack function includes information obtained from an external computing environment including third party data sources. In some embodiments, the network attack function includes randomly generated information.
  • the at least one attack function utilizes a communication protocol. In some embodiments, the at least one attack function utilizes a web services protocol. In some embodiments, the at least one attack function permutation may include interaction with at least one of a private database, a public database, or a network element-specific database. In some embodiments, the at least one attack function permutation is at least partially informed by previously obtained correlation results related to a network element.
  • the communication protocol is full-duplex. In some embodiments, the communication protocol is stateless. In some embodiments, the web services protocol is full-duplex. In some embodiments, the web services protocol provides identity verification through intermediaries. In some embodiments, the web services protocol provides point-to-point identity verification. In some embodiments, the interaction includes at least one each of a read function and a write function with at least one of a private database, a public database, or a network element-specific database.
  • the previously obtained correlation results indicates the relevance of at least one of a cross-site scripting attack, and out of range integer value, a JSON injection, an enormous field repetition, a specially crafted string, a nullbyte, an SQL injection, an illegal character, or a business logic attack.
  • analyzing results of at least one attack function may include at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an automated request generated by artificial intelligence analysis.
  • analyzing the results of at least one attack function includes the use of an artificial intelligence system. In some embodiments, analyzing the results of at least one attack function includes the use of a supervised learning operation. In some embodiments, analyzing results of at least one attack function includes a user interface adapted for visual analysis by a human operator.
  • analyzing results of at least one attack function includes analysis by an artificial intelligence system and approval by a human operator. In some embodiments, the analyzing results of at least one attack function includes analysis by a human operator and an artificial intelligence algorithm. In some embodiments, analyzing results of at least one attack function includes using results from previously analysis sessions.
  • the analyzing results of at least one attack function includes transmitting the analysis results to one or more network elements within an Internet of Things (loT) computing environment. In some embodiments, the analyzing results of at least one attack function includes transmitting the analysis results to one or more network elements within the vehicular computing environment. In some embodiments, the analyzing results of at least one attack function includes transmitting the analysis results to a network element located in an external computing environment. In some embodiments, analyzing results of at least one attack function includes storing the analysis results within one or more network elements located in the vehicular computing environment.
  • LoT Internet of Things
  • analyzing results of at least one attack function includes storing the analysis results in a network element located in an external computing environment.
  • correlating the identified anomalous behavior includes the usage of an artificial intelligence system.
  • correlating the identified anomalous behavior includes an artificial intelligence algorithm.
  • correlating the identified anomalous behavior is performed by a human operator. In some embodiments, correlating the identified anomalous behavior includes the use of a set of predefined and updatable rules to detect anomalous behavior. In some embodiments, correlating the identified anomalous behavior is performed by a human operator aided by an artificial intelligence system.
  • correlating the identified anomalous behavior is performed by a human operator and an artificial intelligence algorithm. In some embodiments, correlating the identified anomalous behavior includes previously obtained correlation results. In some embodiments, correlating the identified anomalous behavior includes transferring the results of the correlation activity to one or more network elements within a vehicular computing environment.
  • correlating the identified anomalous behavior includes transferring the results of the correlation activity to an external computer network. In some embodiments, correlating the identified anomalous behavior includes storing the results of the correlation activity to one or more network elements within the vehicular computing environment. In some embodiments, correlating the identified anomalous behavior includes storing the results of the correlation activity to an external computer network.
  • correlating the identified anomalous behavior includes sending the results of the correlation activity to an exploits database. In some embodiments, correlating the identified anomalous behavior includes correlating the original attack generator request with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating the original request from the backend service with the identified anomalous behavior.
  • correlating the identified anomalous behavior includes correlating a network attack function targeting a backend service with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting a web service with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting a mobile device platform with the identified anomalous behavior.
  • correlating the identified anomalous behavior includes correlating a network attack function targeting a messaging service with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting an authentication service with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting a compute service with the identified anomalous behavior.
  • correlating the identified anomalous behavior includes sending the results of the correlation activity to an attack function generator. In some embodiments, correlating the identified anomalous behavior includes correlating at least one known exploit from an exploits database with the identified anomalous behavior. In some embodiments, sending the results of the correlation activity to an attack function generator result in the generation of an additional attack function permutation. Embodiments may also include when the exploits database is a database external to the vehicle computing environment.
  • Vehicular computing networks are inseparable components of a smart city environment due to several applications that improve the quality of life, safety, and security. Applications of vehicular networks vary from safety applications such as blind spot warning and traffic light violations to entertainment such as streaming media or convenience such as parking space identification. Vehicular networks are mainly composed of vehicle nodes, which behave quite differently from other wireless nodes. Therefore, a vehicular network has several characteristics that may affect the design of Internet of Vehicles (loV) technologies. Some of the characteristics will bring challenges to loV technological development. More often, vehicular computing networks and systems are susceptible to hacking and unauthorized accesses via their vulnerable points, leading to adverse outcomes.
  • LoV Internet of Vehicles
  • Network security systems in vogue perform manual inspection or network scans as a part of vulnerability analysis to identify and safeguard such weak points in the network. For instance, network scanners would transmit package of messages to the devices in the network, receive their responses packets, and then cross-check and audit those responses. This puts a limit to the performance of such network scanners because devices which aren’t actively communicating with these scanners, will escape the process. This is more difficult in a network associated with a vehicular computing system. For example, when the networked devices or networked sensors are housed within different types of vehicles, the differences in vehicle types can complicate the audit. Further complicating matters are instances in which each of the networked devices or networked sensors transmit network communications from multiple routers, hosts and other network devices distributed over a large geographical area. The wide area loT environments themselves and mobile nature of the sensors hinder a thorough audit by active vulnerability scanners. In these loT environments, vulnerability scanners may also miss network activity when some ports and routers are inactive or when transmitted and received messages are screened behind firewalls.
  • Vehicular network has variable density depending on the traffic density, which can be very high in the case of a traffic jam, or very low, as in suburban traffic. At either extreme the network may frequently disconnect. Further, the network scale could be large in dense, urban areas, such as city centers, highways, and at entrances to big cities. Compared to other networks that use unicast (e.g., one sender is connected to one receiver) or multicast where the communication endpoints are defined by ID or group ID, the vehicular networks often have a new type of communication, which addresses the geographical areas where packets need to be forwarded (eg, in safe-driving applications). Vehicular networks also differ from other types of mobile ad-hoc networks in which nodes move randomly.
  • Vehicles are constrained by road topology and layout, by the requirement to obey road signs and traffic lights, and by responding to other moving vehicles, leading to predictability in terms of their mobility. Further, vehicular networks are usually operated in two typical communication environments. In highway traffic scenarios, the environment is relatively simple and straightforward (eg, constrained one-dimensional movement), whereas in city conditions it becomes much more complex. The streets in a city are often separated by buildings, trees, and other obstacles; therefore, there is not always a direct line of communication in the direction of intended data communication.
  • the aforementioned limitations may prevent active vulnerability scanners from monitoring certain hosts and devices which are participating in network sessions.
  • one or multiple passive vulnerability scanners are used in tandem with their active counterparts to scan and monitor traffic in the network so that both types of scanners complement each other.
  • the challenge associated with this approach is the difficulty in parsing the huge volume of data generated and addressing the large number of vulnerabilities identified.
  • network topologies with thousands of nodes and loops may pose a significant challenge in terms of adequate representation that offers visibility into the network. Since resources are usually limited across most organizations, scheduled patch deployment as against a real-time deployment is what is viable in the context of addressing the vulnerabilities. This could make it challenging to identify high-profile and/or high-risk client networks which are susceptible to network and server intrusions.
  • loT environments are becoming ubiquitous across a number of environments including oil & gas prospecting, refinement and recovery. The same can be said of mining across its value chain of surveying, planning, recovery of resources, the refinement process, for example milling, and blending where loT sensors and field processing are increasing in popularity.
  • FIG. 1 depicts a high-level logic flow of an operational process for analyzing the results of one or more network attack functions within a vehicular computing environment serving as an exemplary loT environment.
  • FIG. 2A depicts additional exemplary operations in a high-level logic flow of the operational process analyzing the results of one or more network attack functions within the vehicular computing environment.
  • FIG. 2B depicts a detailed operational flow diagram designed to enable analyzing the results of one or more network attack functions within the vehicular computing environment.
  • FIG. 3 depicts an example representation of a security module for analyzing the results of one or more network attack functions within the vehicular computing environment.
  • FIG. 4 depicts an example system architecture comprising the security module.
  • FIG. 5 A depicts an additional system architecture for analyzing the results of network attack functions and methods.
  • FIG. 5B depicts another detailed system architecture highlighting the functional components of the system.
  • FIGs. 6A- 6B depict example representations of operational process flow within the system architecture.
  • FIGs. 7A-7B depict example representations of attack generation process flow within the system architecture.
  • FIG. 8 illustrates a hardware platform for implementation of the system, according to an example embodiment of the present disclosure.
  • one or more network attack functions may be generated by a vehicular computing environment (VCE).
  • VCE may be any physical, simulated or emulated environment where one or more network elements may be tested for cybersecurity anomalies.
  • the VCE may reside in a hybrid environment that may include at least a combination of at least two of a physical network element, simulated network elements, or emulated network elements.
  • the VCE may also be integrated with an external computing environment.
  • network attack functions may be generated by a VCE, it will be appreciated that network attack functions may be generated.
  • Non-limiting examples of generated network attack function include “from vehicle to mobile,” “from mobile to vehicle,” “from vehicle to itself,” “from vehicle to other vehicles,” and using multi-stage attacks that are generated dynamically according to the received responses.
  • the one or more network elements may include a single device, a plurality of devices, one or more network nodes, one or more databases, one or more lines of computer code, one or more processors, one or more communications elements, or one or more memory elements.
  • a front end and a backend of a network connected device are treated as individual network elements.
  • a network connected device such as a vehicle may include a first network element such as a vehicle front end interface and the vehicle backend a second network element.
  • the network attack functions may be extracted from the memory of the device in the VCE. All of the data from all of the devices within the specified system may be placed into a single, cloudbased data lake. This data lake could be housed within the confines of a public cloud provider such as Microsoft or Amazon, a private cloud environment, or a hybrid environment using some aspects of both a public and private cloud network.
  • the network attack function may be a coded structure containing one or more attack function permutations.
  • the network attack function may be executed within the VCE and is typically focused on one or more network elements.
  • the process may be performed using an attack function permutation generation that is designed to elicit a response from one or more network elements in conjunction with a data lake.
  • the data lake may comprise an attack payload having a combination of all attack function permutations within a network attack function or network attack.
  • the executed network attack function permutation comprises at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an artificial intelligence analysis.
  • the attack function permutation comprises a logical addresses for each of the plurality of network elements.
  • the attack function permutation may further include at least one characteristic for each of the plurality of network elements, at least one of a duration of time to form at least one attack function, a predicted run time to execute at least one attack function, a requirement to comply with a performance specification of an attack function, or an attack function network route but not limited to the like.
  • the network attack function may include randomly generated information.
  • the data lake may store at least one parameter of a specific network element.
  • the parameter may comprise a characteristic in software, hardware, or firmware that helps define a network attack or network element.
  • the intent of a parameter is to evoke a response within the VCE such that anomalous behavior can be identified and correlated to that parameter.
  • a characteristic that triggers an anomalous response to some input may also be required for system validation.
  • the data lake may also be associated with a private database, a public database, or a network element-specific database.
  • the database may include a result and analysis database, an exploit database, an attack database and the like.
  • Examples of network elements associated with the VCE may include an infrastructure monitoring service that can interact with one or more network elements, at least one web service, at least one mobile device platform, at least one messaging service that can interact with one or more network elements, a compute service that can interact with one or more network elements, an authentication service that can interact with one or more network elements and the like.
  • the infrastructure monitoring service may include a vehicle emulator (VE) that may be designed to emulate, without limitation, vehicle operating systems, memory systems, data systems, processing systems, or communications systems.
  • VE vehicle emulator
  • FE frontend emulator
  • the backend service may comprise a management system (interchangeably referred to as the fleet management system) designed to manage vehicles, including but not limited to cars, trucks, boats, ships, airplanes, rail cars, generators, and the like.
  • the backend service may be hosted by one or more cloud services providers, an on-premises hosting solution or a combination of one or more cloud service providers and an on-premises hosting solution.
  • the web service may further include an API gateway that can interact with one or more network elements, one or more microservices such as MQTT services, REST services, Cloud watch logs and the like.
  • API gateway that can interact with one or more network elements, one or more microservices such as MQTT services, REST services, Cloud watch logs and the like.
  • the mobile device platform may include but not limited to an iOS application or an Android application.
  • the messaging service may include at least one of a messaging client, persistent connection, a central messaging broker, or a polling interval.
  • the compute service may be a serverless compute service that can interact with one or more network elements while the authentication service may be a mutual authentication service that can interact with one or more network elements.
  • the external computing environment may be a part of a developer operations environment associated with but not limited to continuous integration, continuous delivery, continuous deployment, or a combination thereof.
  • FIG. 1 shows an exemplary method according to some embodiments of the present disclosure.
  • a method of analyzing the results of a network attack function within a vehicular computing environment including two or more network elements each with at least one known parameter the method including 110 to 130.
  • the method may include executing one or more network attack functions against two or more known network elements.
  • the one or more network attack functions may include a set of attack function permutations.
  • the method may include analyzing results of at least one network attack function to identify anomalous behavior of at least one network element.
  • the method may include correlating the identified anomalous behavior of the at least one network element with a specific network attack function permutation and with at least one parameter of the specific network element.
  • FIGs. 2A and 2B show another exemplary method according to some embodiments of the present disclosure.
  • the method includes one or more steps in addition to 110 to 130 that complements the steps described in FIG. 1.
  • the method may include invoking an attack function that may be initiated via any or a combination of a batch process, a near-real time streaming process.
  • the invocation may occur from an external source or a manual call.
  • the attack function may utilize a messaging protocol / service from an external source upon receiving at 252, an update to a service, or manual call to send at least one parameter.
  • the messaging service may include at least one of a messaging client, persistent connection, a central messaging broker, or a polling interval.
  • the at least one parameter received by utilizing a messaging service may include but not limited to schema, service name, Endpoint URL and the like.
  • the method may include classifying the at least one parameter into two or more categories.
  • classifying the at least one parameter may include a check 254, e.g., checking if the schema exists and is the same as the definition in a service definitions S3 repository. If the schema is not the same at 256, then the method may include at 258 alerting to an authentication service (interchangeably referred to as the audit log hereinafter) or trying to only fuzz fields.
  • the audit log may store alerts and actions needed by an analyst such as new Schema definition found, new category found and the like and then authorize or audit access to the VCE to a user.
  • the method may then include modifying the alerts for new services by the analyst.
  • the method may include building a payload that further includes the steps of pulling attacks from an attack database at 262 to a Dedicated Payload Builder.
  • the attack definition contains a logic of exploit verification and ranking services that provides identity verification through intermediaries or point-to-point identity verification or a combination thereof. Therefore, at 264, the method includes verifying existence of payloads in generated permutations and then at 266, generating the needed permutations and storing the generated permutations.
  • a combination of payloads, endpoints and service information in may be put in an SQS Attacks Queue.
  • the method may include sending the payload by pulling at 270 an attack from the SQS Attacks Queue and queuing in order to invoke a security test against the relevant endpoint, and by establishing at 272, a subscription to MQTT to enrich data upon receiving a response.
  • the method may include launching the attack function through the dedicated connectors and accept the attack definition as it was defined in 206 thereby calculating the exploitability status upon obtaining the response.
  • the method at 208 may include a REST Services Test at 278 that may invoke Subscribe to MQTT on the relevant topic and VIN, send test as frontend (REST to Service Platform), and insert results to a results database.
  • the method at 208 may include a variety of service tests such as Token Based Services Test at 280 that may connect to the Fleet Management with the relevant token for the required service and may also include a MTLS Services Test at 282 that may connect to the Fleet Management via MTLS and may further include a MQTT Services Test at 284 that may connect to the Fleet Management via a combination of MQTT and MTLS for all vehicle related services to identify anomalous behavior behavior.
  • Token Based Services Test at 280 may connect to the Fleet Management with the relevant token for the required service
  • MTLS Services Test at 282 that may connect to the Fleet Management via MTLS
  • MQTT Services Test at 284 that may connect to the Fleet Management via a combination of MQTT and MTLS for all vehicle related services to identify anomalous behavior behavior.
  • the method may include at 210, correlating the identified anomalous behavior may include usage of an artificial intelligence system through an artificial intelligence algorithm or may be performed by a human operator or a combination thereof.
  • correlating the identified anomalous behavior may include the use of a set of predefined and updatable rules to detect anomalous behavior and further include previously obtained correlation results.
  • the identified anomalous behavior may be enriched upon receiving the response and the response data may be correlated with corresponding request by means of a Transaction ID.
  • the method at 210 may further include pulling at 288 information from various internal sources by logging into thee accounts such as Fleet Management CloudWatch, X-Ray, after the end of a test batch, enrich results based on the obtained information, and pushing enriched results into the results database.
  • the method may further include at 212 analyzing the classified results by an analyst by viewing in an interactive Dashboard.
  • the interactive dashboard may provide interaction by including at least one each of a read function and a write function with at least one of a private database, a public database, or a network element-specific database.
  • the database may include a result and analysis database, an exploit database, an attack database and the like.
  • analyzing the results of at least one attack function may include the use of but not limited to an artificial intelligence system, a supervised learning operation, a user interface adapted for visual analysis by a human operator such as the interactive dashboard but not limited to it.
  • the approval of the analysis may be provided by the artificial intelligence system or the human operator (also referred to as the analyst) or a combination thereof.
  • the analysis results may be referred from previously analysis sessions.
  • the classified results may be further transmitted or stored or a combination thereof to one or more network elements within the vehicular computing environment, or to a network element located in an external computing environment or a combination thereof.
  • FIG. 3 depicts an example representation of an infrastructure monitoring service for analyzing the results of one or more network attack functions within the vehicular computing environment.
  • the infrastructure monitoring service may be a cyclic process that may include at 302 a security testing service that may enable staging security testing at 312 then release the test results at 314 followed by pre-production security testing that are fed to a requirement service section at 306.
  • the cyclic process may further include design at 308 and development service at 310 which may again be provided to the staging security testing service at 312.
  • FIG. 4 depicts an example system architecture comprising the infrastructure monitoring service 400.
  • the system architecture may include network attack functions 420 (interchangeably referred to as the threat feeds 420).
  • the network attack functions may undergo offensive tests at 406 based at least in part on a previously derived or previously executed attack function permutation or a combination thereof.
  • the threat feeds may further include attack function permutations comprising one or more attack payloads or the network attack function created by an artificial intelligence system and executed against a plurality of network elements at the application layer.
  • the network attack function 420 may be transmitted to targeted network elements, a frontend emulator at 410, and a vehicle emulator 416, a correlate service 412, and a Fleet Management System (FMS) 418.
  • FMS Fleet Management System
  • each of the network elements 410, 416 and correlate service 412 each receive the network attack function 420 from the offensive test 406, each of the network elements will be sent to a fleet management system 418 (a real backend), and the response 430 and 440 to the executed network attack functions 422 and 424 and returned to the frontend emulator 410.
  • the responses 430 and 440 of the FMS 418 to the executed network attack functions 422 and 424 are received by the frontend emulator 410 and vehicle emulator 416 and transmitted to the correlation service 412.
  • the correlation service 412 correlates or otherwise determines that the responses 430 and 440 to the executed network attack functions 422 and 424 from the frontend emulator at 410 and a vehicle emulator 416 are the result of the network attack function 420.
  • correlation or otherwise determining may be aided by use of a transaction ID and enriched data.
  • An indication of the correlation 426 between the network attack function 420 and the emulated executed network attack functions 422 and 424 is returned to the results and analytics database 408.
  • the emulated executed network attack functions 422 and 424 and executed network attack function responses 430 and 440 of the fleet management system at 418 are provided to the correlation service 412.
  • the executed network attack function permutation may be correlated 412 and emulated at both the frontend emulator 410 and the vehicle emulator 416.
  • the indication of the correlation 426 may be stored in the results and analytics database 408.
  • the indication of the correlation 426 results and contents of the analytics database at 408 may be displayed or otherwise analyzed by the analyst 402.
  • While the present embodiment includes an emulated front end 410, an vehicle emulator, and real backend with vehicles 450 within the FMS 418, it will be appreciated that any combination of real and emulated vehicles 450, frontend, and backend are may be used to achieve and end-to- end a security testing platform 400.
  • FIG. 5 A depicts an additional system architecture for analyzing the results of network attack functions and methods.
  • the system architecture may comprise a web service such as an E2E security testing suit 504 that further may include an API gateway 506.
  • the API Gateway 506 can interact with one or more network elements, the fleet management system 512 comprising one or more microservices that can interact with one or more network elements.
  • the one or more microservices may include an Invoke upon update 514, Cloud watch logs 516, MQTT services 518, REST services 520 and the like.
  • the network attack function permutation comprises at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an artificial intelligence analysis.
  • the network attack functions may be fed to the attack database 530 from an external computing environment including third party data sources such as public or proprietary threat feeds.
  • the attack configuration from the attack database 530 may be then sent to the security testing functions 508 through the dedicated connectors 510 and finally to the fleet management system 512.
  • the output data from the fleet management system 512 may be correlated and enriched at 522 and the correlated and enriched results may be stored in the result database 524.
  • the result database may further store analyzed results from the security testing functions 508.
  • the analyst at 528 may then analyze the results per service data from the results database at 524 through an interactive dashboard at 526.
  • FIG. 5B with reference to FIG. 5A depicts a more detailed system architecture highlighting the functional components of the system.
  • the system architecture service such as the E2E security testing suit 504 include the API gateway 506 that can interact with one or more network elements, the fleet management system 512.
  • the API Gateway 506 may verify: if a schema payload is of known generic type. For example, if the schema is a Protobuf, JSON schema and the like.
  • the API Gateway may further verify if all parameters exist, and are fine and may also verify the source such as Mutual TLS.
  • a classification block at 546 may classify data according to incoming schema, and service received from the API Gateway.
  • the service definitions at 549 may be used to store service definitions for schemas such as Protobufs, JSON schemas and the like.
  • the service definitions at 549 may be checked in order to verify that the incoming schema is matching one that already exists in the schema definitions.
  • the audit log at 551 may store alerts and actions needed by an analyst. For example, if a new schema definition is found then the audit log 551 may store the schema definition. The audit log at 551 may further audit access to the VCE.
  • the dedicated payload builder at 547 may pull one or more attacks from the attacks database at 530, verify the existence of such attacks and fuzzed files in Generated Permutations at 450.
  • the Generated Permutations at 450 may contain payloads of attacks (ready to send Protobufs, JSONs).
  • the Generated Permutations at 450 may further perform pulling existing payloads to avoid recreating payloads and wasting time and resources, generating attack payloads such as Protobufs, JSONs and the like for any new or missing attacks and storing new payloads in Generic Permutations.
  • the attack database at 530 may contain attack configurations, dedicated attacks per service, declaration of fields that need to be fuzzed and fields that need to be kept as is.
  • the attack database at 530 further may accept feeds from PT Integration Service (not shown in FIG. 5A or 5B).
  • the Attacks Queue by Topic SQS at 548 may store a combination of payload, endpoint, connector data but not limited to the like.
  • Dedicated lambda connectors such as the REST services 518, Token services 553, TLS, MQTT service 558, HTTPS MTLS 561, loT Hub Connector and the like are a set of separate Lambdas that can be used to communicate with different communication endpoints in the VCE such as the Fleet Management system, services platform, OEM, and the like.
  • An MQTT subscriber Lambda at 554 may be invoked whenever a response in MQTT is to be expected, for example when sending a REST payload to the Services Platform as a mobile application when the vehicle needs to get some command from the user. Additionally, an enrichment Lambda at 555 may be used to get feeds from different external systems and enrich existing result information such as information from Device Platform/Service Platform CloudWatch, X-Ray, MQTT Insights, and the like.
  • the result database at 524 may store all attack results and insights connected to them, store enrichment information, may query the attacks stored based on timestamps and transaction IDs and supply the end feeds for the Kibana. Additionally, the interactive dashboard at 526 may be used to view alerts, view results, contains dashboards and may have classification and reporting capabilities and the like.
  • FIGs. 6A- 6B depict example representations of operational process flow within the system architecture in the vehicular computing environment.
  • the at least one attack function may utilize a communication protocol and a web service protocol but not limited to the like.
  • the communication protocol may be full-duplex, stateless but not limited to the like while the web services protocol may be full-duplex but not limited to it.
  • the communication protocol may provide communication between the E2E testing suite 504 and the backend service fleet management system 512.
  • the system Prior to establishing the communication to send commands to the fleet management system, the system may create a micro service such as an MQTT client that subscribes to all relevant topics.
  • the Frontend Emulator (FE) 410 may craft a command payload and invoke the REST function REST PUT at 602.
  • the REST function may return a response result which may be received from the Fleet Management System such as a HTTP 200 with Transaction ID (FID), HTTP 404, and the like.
  • the correlation table 612 may include previously obtained correlation results that may indicate the relevance of at least one of a cross-site scripting attack, and out of range integer value, a JSON injection, an enormous field repetition, a specially crafted string, a nullbyte, an SQL injection, an illegal character, or a business logic attack.
  • the frontend emulator 410 may store the HD of the response in a Correlation table 612 along with the parameters of the original crafted command.
  • the MQTT subscriber notifies the Vehicle Emulator (VE) 416 upon receiving an MQTT message.
  • the HD conveyed by the MQTT message is looked up in Correlation table 612. If the same HD is matched, the original command parameters are fetched for further validation from the Correlation table 612.
  • FIG. 6B illustrates another embodiment of the communication between the frontend and the backend services.
  • the vehicle emulator 416 may craft the MQTT Publish payload, generate the Transaction ID (HD) at 604 and insert the HD at 606 into the HD field of the crafted pay load.
  • the generated HD may be stored in the Correlation table 612 along with MQTT Publish command parameters.
  • the Frontend Emulator 410 may issue the REST GET request to a relevant service of the Fleet Management System to obtain the parameters published by the vehicle emulator 416 in and temporarily store in a Management System Cache 652 ( or simply referred to as cache 652).
  • the FE 410 parses the response payload and fetches the TID.
  • the TID may be looked up in the Correlation table. If the same TID is matched, the original MQTT Publish command parameters are fetched from the Correlation table for further validation and comparison.
  • FIGs. 7A-7B depict example representations of attack generation process flow within the system architecture in the vehicular computing environment.
  • the attack generation process flow may include utilizing a communication protocol or a web services protocol or a combination thereof and interact with at least one of a private database, a public database, or a network element-specific database.
  • attack generation process flow may include attempting to retrieve software version from HTTP header and at 720 to 724 running tests corresponding to the retrieved software version.
  • the attack generation process flow may include seeking exploits from an exploit database that may be a database external to the vehicle computing environment while at 732 and 734, the attack generation process flow may include notifying the analyst about new exploits found, crafts new tests based on the new exploits, and updates the exploits database that may include previously obtained correlation results related to a network element.
  • the previously obtained correlation results may indicate the relevance of at least one of a cross-site scripting attack, and out of range integer value, a JSON injection, an enormous field repetition, a specially crafted string, a nullbyte, an SQL injection, an illegal character, or a business logic attack.
  • FIG. 7B illustrates another embodiment, wherein at 736 and 738, the attack generation process flow may include periodically polling external Common Vulnerabilities and Exposures (CVE) databases for new vulnerabilities relevant for the system.
  • CVE lookup expression may be derived from the list of potentially harmful payloads types.
  • the CVE lookup may be triggered by a desire to investigate an anomalous network behavior anything related to bad parsing, the presence of certain packages, or new payloads, received responses or may emerge from new learnings gleaned from polling the system.
  • a CVE lookup may be triggered upon receiving a response indicating a new parser was used, or an unexpected web-server was activated.
  • the atack generation process flow may include at 740 and 742 checking if found vulnerabilities are known by the system that may exist in a local exploits database and at 744 and 746, if vulnerabilities not found, notifying the analyst about new vulnerabilities found, crafts corresponding exploit/test and updates the local Exploits Database.
  • Known system exploits may be held in a network connected CVE database, for example the National Vulnerability Database (NVD). Additional non-limiting examples of CVE databases include Exploits DB, Shodan, and Metasploit.
  • FIG. 8 illustrates a hardware platform for implementation of the system, according to an example embodiment of the present disclosure.
  • the hardware platform 800 may be a computer system 800 that may be used with the examples described herein.
  • the computer system 800 may represent a computational platform that includes components that may be in a server or another computer system.
  • the computer system 800 may execute, by a processor (e.g., a single or multiple processors) or other hardware processing circuit, the methods, functions and other processes described herein.
  • the computer system 800 may include a processor 805 that executes software instructions or code stored on a non-transitory computer-readable storage medium 810 to perform methods of the present disclosure.
  • the software code includes, for example, instructions to gather information pertaining cyber anomalies and data elements in a vehicular computing environment and generate alerts, based on risk assessment of the vehicular computing environment.
  • the instructions on the computer- readable storage medium 810 are read and stored the instructions in storage 815 or in random access memory (RAM) 820.
  • the storage 815 provides a large space for keeping static data where at least some instructions could be stored for later execution.
  • the stored instructions may be further compiled to generate other representations of the instructions and dynamically stored in the RAM 820.
  • the processor 805 reads instructions from the RAM 820 and performs actions as instructed.
  • the computer system 800 further includes an output device 825 to provide at least some of the results of the execution as output including, but not limited to, visual information to users, such as external agents.
  • the output device can include a display on computing devices and virtual reality glasses or may be an interactive dashboard.
  • the display can be a mobile phone screen or a laptop screen. GUIs and/or text are presented as an output on the display screen.
  • the computer system 800 further includes input device 830 to provide a user or another device with mechanisms for entering data and/or otherwise interact with the computer system 800.
  • the input device may include, for example, a keyboard, a keypad, a mouse, or a touchscreen.
  • output of any of the attach generator, the data lake, the machine learning engine may be displayed on the output device 825.
  • Each of these output devices 825 and input devices 830 could be joined by one or more additional peripherals.
  • the output device 825 may be used to provide alerts or display a risk assessment map of the environment.
  • a network communicator 835 may be provided to connect the computer system 800 to a network and in turn to other devices connected to the network including other clients, servers, data stores, and interfaces, for instance.
  • a network communicator 835 may include, for example, a network adapter such as a LAN adapter or a wireless adapter.
  • the computer system 800 includes a data source interface 840 to access data source 845.
  • a data source is an information resource.
  • a database of exceptions and rules may be a data source.
  • knowledge repositories and curated data may be other examples of data sources.
  • an implementer may opt for a mainly hardware and/or firmware vehicle; alternatively, if flexibility is paramount, the implementer may opt for a mainly software implementation; or, yet again alternatively, the implementer may opt for some combination of hardware, software, and/or firmware.
  • any vehicle to be utilized is a choice dependent upon the context in which the vehicle will be deployed and the specific concerns (e.g., speed, flexibility, or predictability) of the implementer, any of which may vary.
  • logic and similar implementations may include software or other control structures suitable to operation.
  • Electronic circuitry may manifest one or more paths of electrical current constructed and arranged to implement various logic functions as described herein.
  • one or more media are configured to bear a device- detectable implementation if such media hold or transmit a special-purpose device instruction set operable to perform as described herein.
  • this may manifest as an update or other modification of existing software or firmware, or of gate arrays or other programmable hardware, such as by performing a reception of or a transmission of one or more instructions in relation to one or more operations described herein.
  • an implementation may include specialpurpose hardware, software, firmware components, and/or general-purpose components executing or otherwise controlling special-purpose components. Specifications or other implementations may be transmitted by one or more instances of tangible or transitory transmission media as described herein, optionally by packet transmission or otherwise by passing through distributed media at various times.
  • implementations may include executing a specialpurpose instruction sequence or otherwise operating circuitry for enabling, triggering, coordinating, requesting, or otherwise causing one or more occurrences of any functional operations described above.
  • operational or other logical descriptions herein may be expressed directly as source code and compiled or otherwise expressed as an executable instruction sequence.
  • C++ or other code sequences can be compiled directly or otherwise implemented in high-level descriptor languages (e.g., a logic- synthesizable language, a hardware description language, a hardware design simulation, and/or other such similar modes of expression).
  • some or all of the logical expression may be manifested as a Verilog-type hardware description or other circuitry model before physical implementation in hardware, especially for basic operations or timing-critical applications.
  • Verilog-type hardware description or other circuitry model before physical implementation in hardware, especially for basic operations or timing-critical applications.
  • Examples of a signal bearing medium include, but are not limited to, the following: a recordable type medium such as a USB drive, a solid state memory device, a hard disk drive, a Compact Disc (CD), a Digital Video Disk (DVD), a digital tape, a computer memory, etc.; and a transmission type medium such as a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communications link, a wireless communication link (e.g., transmitter, receiver, transmission logic, reception logic, etc.), etc.).
  • a recordable type medium such as a USB drive, a solid state memory device, a hard disk drive, a Compact Disc (CD), a Digital Video Disk (DVD), a digital tape, a computer memory, etc.
  • a transmission type medium such as a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communications link, a wireless communication link (e.g
  • electrical circuitry includes, but is not limited to, electrical circuitry having at least one discrete electrical circuit, electrical circuitry having at least one integrated circuit, electrical circuitry having at least one application specific integrated circuit, electrical circuitry forming a general purpose computing device configured by a computer program (e.g., a general purpose computer configured by a computer program which at least partially carries out processes and/or devices described herein, or a microprocessor configured by a computer program which at least partially carries out processes and/or devices described herein), electrical circuitry forming a memory device (e.g., forms of memory (e.g., random access, flash, read-only, etc.)), and/or electrical circuitry forming a communications device (
  • a data processing system generally includes one or more of a system unit housing, a video display device, memory such as volatile or non-volatile memory, processors such as microprocessors or digital signal processors, computational entities such as operating systems, drivers, graphical user interfaces, and applications programs, one or more interaction devices (e.g., a touch pad, a touch screen, an antenna, etc.), and/or control systems including feedback loops and control motors (e.g., feedback for sensing position and/or velocity; control motors for moving and/or adjusting components and/or quantities).
  • a data processing system may be implemented utilizing suitable commercially available components, such as those typically found in data computing/communi cation and/or network computing/communication systems.
  • use of a system or method as disclosed and claimed herein may occur in a territory even if components are located outside the territory.
  • use of a distributed computing system may occur in a territory even though parts of the system may be located outside of the territory (e.g., relay, server, processor, signalbearing medium, transmitting computer, receiving computer, etc. located outside the territory).
  • a sale of a system or method may likewise occur in a territory even if components of the system or method are located and/or used outside the territory.
  • implementation of at least part of a system for performing a method in one territory does not preclude use of the system in another territory.
  • any two components herein combined to achieve a particular functionality can be seen as “associated with” each other such that the desired functionality is achieved, irrespective of architectures or intermedial components.
  • any two components so associated can also be viewed as being “operably connected,” or “operably coupled,” to each other to achieve the desired functionality, and any two components capable of being so associated can also be viewed as being “operably couplable,” to each other to achieve the desired functionality.
  • Specific examples of “operably couplable” include but are not limited to physically mateable or physically interacting components, wirelessly interactable components, wirelessly interacting components, logically interacting components, or logically interactable components.
  • one or more components may be referred to herein as “configured to,” “configurable to,” “operable/operative to,” “adapted/adaptable,” “able to,” “conformable/conformed to,” etc.
  • “configured to” can generally encompass active-state components, inactive-state components, or standby-state components, unless context requires otherwise.

Abstract

Embodiments of the present disclosure include a method of analyzing the results of a network attack function within an loT environment, for example a vehicular, residential, or industrial computing environment including two or more network elements each with at least one known parameter, the method including a) executing one or more network attack functions against two or more known network elements; b) analyzing results of at least one network attack function to identify anomalous behavior of at least one network element; and c) correlating the identified anomalous behavior of the at least one network element with a specific network attack function permutation and with at least one parameter of the specific network element. In some embodiments, the one or more network attack functions includes a set of attack function permutations.

Description

METHODS AND SYSTEMS OF CORRELATING NETWORK ATTACKS WITH NETWORK ELEMENT BEHAVIOR
INVENTORS
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application claims priority to U.S. Provisional Patent Application No. 63/253,577 filed October 8, 2021, titled “METHODS AND SYSTEMS OF CORRELATING NETWORK ATTACKS WITH NETWORK ELEMENT BEHAVIOR" which is hereby incorporated by reference in its entirety.
TECHNICAL FIELD
The subject matter herein relates to data capture and data handling techniques.
BRIEF SUMMARY
[0002] Embodiments of the present disclosure include a method of analyzing the results of one or more network attack functions within a vehicular computing environment including two or more network elements each with at least one known parameter, the method including a) executing one or more network attack functions against two or more known network elements; b) analyzing results of at least one network attack function to identify anomalous behavior of at least one network element; and c) correlating the identified anomalous behavior of the at least one network element with a specific network attack function permutation and with at least one parameter of the specific network element. In some embodiments, the one or more network attack functions includes a set of attack function permutations.
[0003] In some embodiments, a network element may include a single device, a plurality of devices, one or more network nodes, one or more databases, one or more lines of computer code, one or more processors, one or more communications elements, or one or more memory elements. In some embodiments, the plurality of network elements include simulated network elements that reside on a simulated vehicular computing environment.
[0004] In some embodiments, the plurality of network elements include emulated network elements that reside on an emulated vehicular computing environment. In some embodiments, the plurality of network elements reside on a physical network. In some embodiments, the plurality of network elements reside in a hybrid environment. In some embodiments, the hybrid environment may include at least a combination of at least two of a physical network element, a simulated network element, or an emulated network element.
[0005] In some embodiments, the plurality of network elements includes an infrastructure monitoring service that can interact with one or more network elements. In some embodiments, at least one parameter of a specific network element is stored in a database. In some embodiments, at least one parameter of a specific network element is used for further system validation. In some embodiments, the plurality of network elements includes at least one backend service.
[0006] In some embodiments, the plurality of network elements includes at least one web service. In some embodiments, the plurality of network elements includes at least one mobile device platform. In some embodiments, the plurality of network elements includes at least one messaging service that can interact with one or more network elements. In some embodiments, the plurality of network elements includes a compute service that can interact with one or more network elements.
[0007] In some embodiments, the plurality of network elements includes an authentication service that can interact with one or more network elements. In some embodiments, the vehicular computing environment is integrated with an external computing environment. In some embodiments, the backend service is a fleet management service. In some embodiments, the backend service is hosted by one or more cloud services providers.
[0008] In some embodiments, the backend service is hosted using an on-premises hosting solution. In some embodiments, the backend service is hosted using a combination of one or more cloud service providers and an on-premises hosting solution. In some embodiments, the web service is hosted by one or more cloud services providers. In some embodiments, the web service is hosted using an on-premises hosting solution.
[0009] In some embodiments, the web service is hosted using a combination of one or more cloud service providers and an on-premises hosting solution. In some embodiments, the web service includes an API gateway that can interact with one or more network elements. In some embodiments, the web service one or more microservices that can interact with one or more network elements. In some embodiments, the at least one a mobile device platform includes an iOS application or an Android application.
[0010] In some embodiments, the messaging service includes at least one of a messaging client, persistent connection, a central messaging broker, or a polling interval. In some embodiments, the compute service is a serverless compute service that can interact with one or more network elements. In some embodiments, the authentication service is a mutual authentication service that can interact with one or more network elements.
[0011] Embodiments may also include connection with an external computing environment. In some embodiments, the external computing environment is part of a developer operations environment associated with continuous integration. In some embodiments, the external computing environment is part of a developer operations environment associated with continuous delivery. In some embodiments, the external computing environment is part of a developer operations environment associated with continuous deployment.
[0012] In some embodiments, the executed network attack function permutation may include at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an artificial intelligence analysis. In some embodiments, the at least one attack function permutation may include a logical addresses for each of the plurality of network elements.
[0013] In some embodiments, the at least one attack function permutation may include at least one characteristic for each of the plurality of network elements. In some embodiments, the at least one attack function permutation may include at least one of a duration of time to form at least one attack function, a predicted run time to execute at least one attack function, a requirement to comply with a performance specification of an attack function, or an attack function network route.
[0014] In some embodiments, the at least one attack function is initiated via a batch process. In some embodiments, the at least one attack function is initiated via a near-real time streaming process. In some embodiments, the at least one attack function utilizes a messaging protocol. In some embodiments, the at least one attack function is targeting a frontend emulator. In some embodiments, the at least one attack function is based at least in part on a previously derived attack function permutation.
[0015] In some embodiments, the at least one attack function is based at least in part on a previously executed attack function permutation. In some embodiments, the at least one attack function permutations may also include one or more attack payloads. In some embodiments, the network attack function was created by an artificial intelligence system. In some embodiments, the at least one executed network attack function is executed against a plurality of network elements at the application layer.
[0016] In some embodiments, the network attack function was created by a human operator. In some embodiments, the network attack function was created by combination of an artificial intelligence system and a human operator. In some embodiments, the network attack function includes information obtained from an external computing environment including third party data sources. In some embodiments, the network attack function includes randomly generated information.
[0017] In some embodiments, the at least one attack function utilizes a communication protocol. In some embodiments, the at least one attack function utilizes a web services protocol. In some embodiments, the at least one attack function permutation may include interaction with at least one of a private database, a public database, or a network element-specific database. In some embodiments, the at least one attack function permutation is at least partially informed by previously obtained correlation results related to a network element.
[0018] In some embodiments, the communication protocol is full-duplex. In some embodiments, the communication protocol is stateless. In some embodiments, the web services protocol is full-duplex. In some embodiments, the web services protocol provides identity verification through intermediaries. In some embodiments, the web services protocol provides point-to-point identity verification. In some embodiments, the interaction includes at least one each of a read function and a write function with at least one of a private database, a public database, or a network element-specific database.
[0019] In some embodiments, the previously obtained correlation results indicates the relevance of at least one of a cross-site scripting attack, and out of range integer value, a JSON injection, an enormous field repetition, a specially crafted string, a nullbyte, an SQL injection, an illegal character, or a business logic attack. In some embodiments, analyzing results of at least one attack function may include at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an automated request generated by artificial intelligence analysis.
[0020] In some embodiments, analyzing the results of at least one attack function includes the use of an artificial intelligence system. In some embodiments, analyzing the results of at least one attack function includes the use of a supervised learning operation. In some embodiments, analyzing results of at least one attack function includes a user interface adapted for visual analysis by a human operator.
[0021] In some embodiments, analyzing results of at least one attack function includes analysis by an artificial intelligence system and approval by a human operator. In some embodiments, the analyzing results of at least one attack function includes analysis by a human operator and an artificial intelligence algorithm. In some embodiments, analyzing results of at least one attack function includes using results from previously analysis sessions.
[0022] In some embodiments, the analyzing results of at least one attack function includes transmitting the analysis results to one or more network elements within an Internet of Things (loT) computing environment. In some embodiments, the analyzing results of at least one attack function includes transmitting the analysis results to one or more network elements within the vehicular computing environment. In some embodiments, the analyzing results of at least one attack function includes transmitting the analysis results to a network element located in an external computing environment. In some embodiments, analyzing results of at least one attack function includes storing the analysis results within one or more network elements located in the vehicular computing environment.
[0023] In some embodiments, analyzing results of at least one attack function includes storing the analysis results in a network element located in an external computing environment. In some embodiments, correlating the identified anomalous behavior includes the usage of an artificial intelligence system. In some embodiments, correlating the identified anomalous behavior includes an artificial intelligence algorithm.
[0024] In some embodiments, correlating the identified anomalous behavior is performed by a human operator. In some embodiments, correlating the identified anomalous behavior includes the use of a set of predefined and updatable rules to detect anomalous behavior. In some embodiments, correlating the identified anomalous behavior is performed by a human operator aided by an artificial intelligence system.
[0025] In some embodiments, correlating the identified anomalous behavior is performed by a human operator and an artificial intelligence algorithm. In some embodiments, correlating the identified anomalous behavior includes previously obtained correlation results. In some embodiments, correlating the identified anomalous behavior includes transferring the results of the correlation activity to one or more network elements within a vehicular computing environment.
[0026] In some embodiments, correlating the identified anomalous behavior includes transferring the results of the correlation activity to an external computer network. In some embodiments, correlating the identified anomalous behavior includes storing the results of the correlation activity to one or more network elements within the vehicular computing environment. In some embodiments, correlating the identified anomalous behavior includes storing the results of the correlation activity to an external computer network.
[0027] In some embodiments, correlating the identified anomalous behavior includes sending the results of the correlation activity to an exploits database. In some embodiments, correlating the identified anomalous behavior includes correlating the original attack generator request with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating the original request from the backend service with the identified anomalous behavior.
[0028] In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting a backend service with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting a web service with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting a mobile device platform with the identified anomalous behavior.
[0029] In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting a messaging service with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting an authentication service with the identified anomalous behavior. In some embodiments, correlating the identified anomalous behavior includes correlating a network attack function targeting a compute service with the identified anomalous behavior.
[0030] In some embodiments, correlating the identified anomalous behavior includes sending the results of the correlation activity to an attack function generator. In some embodiments, correlating the identified anomalous behavior includes correlating at least one known exploit from an exploits database with the identified anomalous behavior. In some embodiments, sending the results of the correlation activity to an attack function generator result in the generation of an additional attack function permutation. Embodiments may also include when the exploits database is a database external to the vehicle computing environment.
BACKGROUND
[0031] Vehicular computing networks are inseparable components of a smart city environment due to several applications that improve the quality of life, safety, and security. Applications of vehicular networks vary from safety applications such as blind spot warning and traffic light violations to entertainment such as streaming media or convenience such as parking space identification. Vehicular networks are mainly composed of vehicle nodes, which behave quite differently from other wireless nodes. Therefore, a vehicular network has several characteristics that may affect the design of Internet of Vehicles (loV) technologies. Some of the characteristics will bring challenges to loV technological development. More often, vehicular computing networks and systems are susceptible to hacking and unauthorized accesses via their vulnerable points, leading to adverse outcomes. Network security systems in vogue perform manual inspection or network scans as a part of vulnerability analysis to identify and safeguard such weak points in the network. For instance, network scanners would transmit package of messages to the devices in the network, receive their responses packets, and then cross-check and audit those responses. This puts a limit to the performance of such network scanners because devices which aren’t actively communicating with these scanners, will escape the process. This is more difficult in a network associated with a vehicular computing system. For example, when the networked devices or networked sensors are housed within different types of vehicles, the differences in vehicle types can complicate the audit. Further complicating matters are instances in which each of the networked devices or networked sensors transmit network communications from multiple routers, hosts and other network devices distributed over a large geographical area. The wide area loT environments themselves and mobile nature of the sensors hinder a thorough audit by active vulnerability scanners. In these loT environments, vulnerability scanners may also miss network activity when some ports and routers are inactive or when transmitted and received messages are screened behind firewalls.
[0032] Thus, active vulnerability scanners often cannot dig out exhaustive information of a network such as security configurations and settings. Consequently, such scanners fail to detect network breaches in real-time if intruders resort to network-obscuring tactics such as the use of non-standard ports and custom protocols in several backdoor and rootkit applications. Scanning the network for possible breaches requires real-time monitoring which is beyond the scope of active vulnerability scanners, putting them at a serious disadvantage in terms of identifying potential vulnerabilities in the network, or building models or topologies for the network. Moreover, vehicular network has highly dynamic topology. Compared to common mobile nodes, vehicles may move at quite a high speed. This causes the topology of a vehicular network to change frequently. Such high dynamicity in network topology must be carefully considered in during scanning. Vehicular network has variable density depending on the traffic density, which can be very high in the case of a traffic jam, or very low, as in suburban traffic. At either extreme the network may frequently disconnect. Further, the network scale could be large in dense, urban areas, such as city centers, highways, and at entrances to big cities. Compared to other networks that use unicast (e.g., one sender is connected to one receiver) or multicast where the communication endpoints are defined by ID or group ID, the vehicular networks often have a new type of communication, which addresses the geographical areas where packets need to be forwarded (eg, in safe-driving applications). Vehicular networks also differ from other types of mobile ad-hoc networks in which nodes move randomly. Vehicles, on the other hand, are constrained by road topology and layout, by the requirement to obey road signs and traffic lights, and by responding to other moving vehicles, leading to predictability in terms of their mobility. Further, vehicular networks are usually operated in two typical communication environments. In highway traffic scenarios, the environment is relatively simple and straightforward (eg, constrained one-dimensional movement), whereas in city conditions it becomes much more complex. The streets in a city are often separated by buildings, trees, and other obstacles; therefore, there is not always a direct line of communication in the direction of intended data communication.
[0033] The aforementioned limitations may prevent active vulnerability scanners from monitoring certain hosts and devices which are participating in network sessions. To mitigate this issue, in various security systems, one or multiple passive vulnerability scanners are used in tandem with their active counterparts to scan and monitor traffic in the network so that both types of scanners complement each other. The challenge associated with this approach is the difficulty in parsing the huge volume of data generated and addressing the large number of vulnerabilities identified. Particularly, network topologies with thousands of nodes and loops may pose a significant challenge in terms of adequate representation that offers visibility into the network. Since resources are usually limited across most organizations, scheduled patch deployment as against a real-time deployment is what is viable in the context of addressing the vulnerabilities. This could make it challenging to identify high-profile and/or high-risk client networks which are susceptible to network and server intrusions.
[0034] Several drawbacks however plague the traditional network modelling solutions within an loT environment. For example, in an loT environment like a vehicle; a vehicular computing platform may be fully patched for instance but administered from a computing device which accesses the internet in an unprotected mode, such as by using an unpatched web browser. This may lead to vulnerabilities going undetected under aforementioned techniques. While the example of a vehicular computing platform is provided, loT environments are becoming ubiquitous across a number of environments including oil & gas prospecting, refinement and recovery. The same can be said of mining across its value chain of surveying, planning, recovery of resources, the refinement process, for example milling, and blending where loT sensors and field processing are increasing in popularity. In such environments, key activities where sensor data is relayed to servers for interpretation, boundary detection, and updated ore body knowledge (OBK), environmental sensors are often managed by contractors and company employees where user behavior and devices vary considerably in network security practices. For example, outdated configurations of traffic management systems including firewalls, switches and routers will escape vulnerability modelling in terms of reflecting the current network configuration state. This is further complicated by the fact that some systems may have flat configurations wherein every system can access to every other system within the firewall, providing a sharp contrast to other types where only the admin for instance, can access the servers. In loT environments, such as mining, transport and logistics, aerospace, vehicles, construction, and property management, various permutations and combinations of client-side and server-side exploits are beyond the scope of current server-centric vulnerability modelling systems.
[0035] Thus, there is a requirement for a network security system that can monitor and predict the entire spectrum of security threats and weak points in a vehicular computing network including those that correspond to remotely and/or internally accessible susceptibilities covering services, client software and trust relationships. Further, the hack paths and possible intrusion approaches need to be simulated in a security system so as to thwart any possible security breaches on those vulnerable points.
BRIEF DESCRIPTION OF THE FIGURES
[0036] FIG. 1 depicts a high-level logic flow of an operational process for analyzing the results of one or more network attack functions within a vehicular computing environment serving as an exemplary loT environment. [0037] FIG. 2A depicts additional exemplary operations in a high-level logic flow of the operational process analyzing the results of one or more network attack functions within the vehicular computing environment.
[0038] FIG. 2B depicts a detailed operational flow diagram designed to enable analyzing the results of one or more network attack functions within the vehicular computing environment.
[0039] FIG. 3 depicts an example representation of a security module for analyzing the results of one or more network attack functions within the vehicular computing environment.
[0040] FIG. 4 depicts an example system architecture comprising the security module.
[0041] FIG. 5 A depicts an additional system architecture for analyzing the results of network attack functions and methods.
[0042] FIG. 5B depicts another detailed system architecture highlighting the functional components of the system.
[0043] FIGs. 6A- 6B depict example representations of operational process flow within the system architecture.
[0044] FIGs. 7A-7B depict example representations of attack generation process flow within the system architecture.
[0045] FIG. 8 illustrates a hardware platform for implementation of the system, according to an example embodiment of the present disclosure.
DETAILED DESCRIPTION
[0046] In the following detailed description, reference is made to the accompanying drawings, which form a part hereof. In the drawings, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, drawings, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented here. [0047] In the present invention, one or more network attack functions may be generated by a vehicular computing environment (VCE). The VCE may be any physical, simulated or emulated environment where one or more network elements may be tested for cybersecurity anomalies. Alternatively, the VCE may reside in a hybrid environment that may include at least a combination of at least two of a physical network element, simulated network elements, or emulated network elements. The VCE may also be integrated with an external computing environment. While network attack functions may be generated by a VCE, it will be appreciated that network attack functions may be generated. Non-limiting examples of generated network attack function include “from vehicle to mobile,” “from mobile to vehicle,” “from vehicle to itself,” “from vehicle to other vehicles,” and using multi-stage attacks that are generated dynamically according to the received responses.
[0048] The one or more network elements may include a single device, a plurality of devices, one or more network nodes, one or more databases, one or more lines of computer code, one or more processors, one or more communications elements, or one or more memory elements. At times, a front end and a backend of a network connected device are treated as individual network elements. For example, a network connected device, such as a vehicle may include a first network element such as a vehicle front end interface and the vehicle backend a second network element. The network attack functions may be extracted from the memory of the device in the VCE. All of the data from all of the devices within the specified system may be placed into a single, cloudbased data lake. This data lake could be housed within the confines of a public cloud provider such as Microsoft or Amazon, a private cloud environment, or a hybrid environment using some aspects of both a public and private cloud network.
[0049] Within the cloud infrastructure are multiple algorithms, including one that can generate network attack function that may be a coded structure containing one or more attack function permutations. The network attack function may be executed within the VCE and is typically focused on one or more network elements. At a high level, the process may be performed using an attack function permutation generation that is designed to elicit a response from one or more network elements in conjunction with a data lake. The data lake may comprise an attack payload having a combination of all attack function permutations within a network attack function or network attack. [0050] Alternatively, the executed network attack function permutation comprises at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an artificial intelligence analysis. The attack function permutation comprises a logical addresses for each of the plurality of network elements.
[0051] The attack function permutation may further include at least one characteristic for each of the plurality of network elements, at least one of a duration of time to form at least one attack function, a predicted run time to execute at least one attack function, a requirement to comply with a performance specification of an attack function, or an attack function network route but not limited to the like. Or alternatively, the network attack function may include randomly generated information.
[0052] The data lake may store at least one parameter of a specific network element. For example, the parameter may comprise a characteristic in software, hardware, or firmware that helps define a network attack or network element. In both cases, the intent of a parameter is to evoke a response within the VCE such that anomalous behavior can be identified and correlated to that parameter. For example, a characteristic that triggers an anomalous response to some input. The one or more parameters may also be required for system validation. The data lake may also be associated with a private database, a public database, or a network element-specific database. For example, the database may include a result and analysis database, an exploit database, an attack database and the like.
[0053] Examples of network elements associated with the VCE may include an infrastructure monitoring service that can interact with one or more network elements, at least one web service, at least one mobile device platform, at least one messaging service that can interact with one or more network elements, a compute service that can interact with one or more network elements, an authentication service that can interact with one or more network elements and the like.
[0054] The infrastructure monitoring service may include a vehicle emulator (VE) that may be designed to emulate, without limitation, vehicle operating systems, memory systems, data systems, processing systems, or communications systems. [0055] Alternatively, the infrastructure monitoring service may further include a frontend emulator (FE) that may be designed to emulate the frontend of a system, typically the client or visual elements of an application or service.
[0056] The backend service may comprise a management system (interchangeably referred to as the fleet management system) designed to manage vehicles, including but not limited to cars, trucks, boats, ships, airplanes, rail cars, generators, and the like. The backend service may be hosted by one or more cloud services providers, an on-premises hosting solution or a combination of one or more cloud service providers and an on-premises hosting solution.
[0057] The web service may further include an API gateway that can interact with one or more network elements, one or more microservices such as MQTT services, REST services, Cloud watch logs and the like.
[0058] Alternatively, the mobile device platform may include but not limited to an iOS application or an Android application. The messaging service may include at least one of a messaging client, persistent connection, a central messaging broker, or a polling interval.
[0059] The compute service may be a serverless compute service that can interact with one or more network elements while the authentication service may be a mutual authentication service that can interact with one or more network elements.
[0060] The external computing environment may be a part of a developer operations environment associated with but not limited to continuous integration, continuous delivery, continuous deployment, or a combination thereof.
[0061] FIG. 1 shows an exemplary method according to some embodiments of the present disclosure. According to FIG. 1 , a method of analyzing the results of a network attack function within a vehicular computing environment including two or more network elements each with at least one known parameter, the method including 110 to 130. At 110, the method may include executing one or more network attack functions against two or more known network elements. The one or more network attack functions may include a set of attack function permutations. At 120, the method may include analyzing results of at least one network attack function to identify anomalous behavior of at least one network element. Furthermore, at 130, the method may include correlating the identified anomalous behavior of the at least one network element with a specific network attack function permutation and with at least one parameter of the specific network element.
[0062] FIGs. 2A and 2B show another exemplary method according to some embodiments of the present disclosure. In some embodiments, the method includes one or more steps in addition to 110 to 130 that complements the steps described in FIG. 1.
[0063] At 202, the method may include invoking an attack function that may be initiated via any or a combination of a batch process, a near-real time streaming process. The invocation may occur from an external source or a manual call. The attack function may utilize a messaging protocol / service from an external source upon receiving at 252, an update to a service, or manual call to send at least one parameter. The messaging service may include at least one of a messaging client, persistent connection, a central messaging broker, or a polling interval.
[0064] The at least one parameter received by utilizing a messaging service may include but not limited to schema, service name, Endpoint URL and the like. At 204, the method may include classifying the at least one parameter into two or more categories. For example, classifying the at least one parameter may include a check 254, e.g., checking if the schema exists and is the same as the definition in a service definitions S3 repository. If the schema is not the same at 256, then the method may include at 258 alerting to an authentication service (interchangeably referred to as the audit log hereinafter) or trying to only fuzz fields. The audit log may store alerts and actions needed by an analyst such as new Schema definition found, new category found and the like and then authorize or audit access to the VCE to a user.
[0065] At 260, the method may then include modifying the alerts for new services by the analyst. At 206, the method may include building a payload that further includes the steps of pulling attacks from an attack database at 262 to a Dedicated Payload Builder. The attack definition contains a logic of exploit verification and ranking services that provides identity verification through intermediaries or point-to-point identity verification or a combination thereof. Therefore, at 264, the method includes verifying existence of payloads in generated permutations and then at 266, generating the needed permutations and storing the generated permutations. Hence at 268, a combination of payloads, endpoints and service information in may be put in an SQS Attacks Queue.
[0066] Furthermore, at 208, the method may include sending the payload by pulling at 270 an attack from the SQS Attacks Queue and queuing in order to invoke a security test against the relevant endpoint, and by establishing at 272, a subscription to MQTT to enrich data upon receiving a response. At 274, the method may include launching the attack function through the dedicated connectors and accept the attack definition as it was defined in 206 thereby calculating the exploitability status upon obtaining the response. The method at 208, may include a REST Services Test at 278 that may invoke Subscribe to MQTT on the relevant topic and VIN, send test as frontend (REST to Service Platform), and insert results to a results database. The method at 208, may include a variety of service tests such as Token Based Services Test at 280 that may connect to the Fleet Management with the relevant token for the required service and may also include a MTLS Services Test at 282 that may connect to the Fleet Management via MTLS and may further include a MQTT Services Test at 284 that may connect to the Fleet Management via a combination of MQTT and MTLS for all vehicle related services to identify anomalous behavior behavior.
[0067] The method may include at 210, correlating the identified anomalous behavior may include usage of an artificial intelligence system through an artificial intelligence algorithm or may be performed by a human operator or a combination thereof.
[0068] Alternatively, correlating the identified anomalous behavior may include the use of a set of predefined and updatable rules to detect anomalous behavior and further include previously obtained correlation results. For example, at 286, the identified anomalous behavior may be enriched upon receiving the response and the response data may be correlated with corresponding request by means of a Transaction ID. The method at 210, may further include pulling at 288 information from various internal sources by logging into thee accounts such as Fleet Management CloudWatch, X-Ray, after the end of a test batch, enrich results based on the obtained information, and pushing enriched results into the results database.
[0069] The method may further include at 212 analyzing the classified results by an analyst by viewing in an interactive Dashboard. The interactive dashboard may provide interaction by including at least one each of a read function and a write function with at least one of a private database, a public database, or a network element-specific database. For example, the database may include a result and analysis database, an exploit database, an attack database and the like.
[0070] In an embodiment, analyzing the results of at least one attack function may include the use of but not limited to an artificial intelligence system, a supervised learning operation, a user interface adapted for visual analysis by a human operator such as the interactive dashboard but not limited to it. The approval of the analysis may be provided by the artificial intelligence system or the human operator (also referred to as the analyst) or a combination thereof. The analysis results may be referred from previously analysis sessions.
[0071] The classified results may be further transmitted or stored or a combination thereof to one or more network elements within the vehicular computing environment, or to a network element located in an external computing environment or a combination thereof.
[0072] FIG. 3 depicts an example representation of an infrastructure monitoring service for analyzing the results of one or more network attack functions within the vehicular computing environment. According to FIG. 3, the infrastructure monitoring service may be a cyclic process that may include at 302 a security testing service that may enable staging security testing at 312 then release the test results at 314 followed by pre-production security testing that are fed to a requirement service section at 306. The cyclic process may further include design at 308 and development service at 310 which may again be provided to the staging security testing service at 312.
[0073] FIG. 4 depicts an example system architecture comprising the infrastructure monitoring service 400. As illustrated in FIG. 4, the system architecture may include network attack functions 420 (interchangeably referred to as the threat feeds 420). The network attack functions may undergo offensive tests at 406 based at least in part on a previously derived or previously executed attack function permutation or a combination thereof. The threat feeds may further include attack function permutations comprising one or more attack payloads or the network attack function created by an artificial intelligence system and executed against a plurality of network elements at the application layer. [0074] The network attack function 420 may be transmitted to targeted network elements, a frontend emulator at 410, and a vehicle emulator 416, a correlate service 412, and a Fleet Management System (FMS) 418. Once the network elements 410, 416 and correlate service 412 each receive the network attack function 420 from the offensive test 406, each of the network elements will be sent to a fleet management system 418 (a real backend), and the response 430 and 440 to the executed network attack functions 422 and 424 and returned to the frontend emulator 410. The responses 430 and 440 of the FMS 418 to the executed network attack functions 422 and 424 are received by the frontend emulator 410 and vehicle emulator 416 and transmitted to the correlation service 412. The correlation service 412 correlates or otherwise determines that the responses 430 and 440 to the executed network attack functions 422 and 424 from the frontend emulator at 410 and a vehicle emulator 416 are the result of the network attack function 420. For example, correlation or otherwise determining may be aided by use of a transaction ID and enriched data. An indication of the correlation 426 between the network attack function 420 and the emulated executed network attack functions 422 and 424 is returned to the results and analytics database 408. In some instances, the emulated executed network attack functions 422 and 424 and executed network attack function responses 430 and 440 of the fleet management system at 418 are provided to the correlation service 412. The executed network attack function permutation may be correlated 412 and emulated at both the frontend emulator 410 and the vehicle emulator 416. The indication of the correlation 426 may be stored in the results and analytics database 408. The indication of the correlation 426 results and contents of the analytics database at 408 may be displayed or otherwise analyzed by the analyst 402. While the present embodiment includes an emulated front end 410, an vehicle emulator, and real backend with vehicles 450 within the FMS 418, it will be appreciated that any combination of real and emulated vehicles 450, frontend, and backend are may be used to achieve and end-to- end a security testing platform 400.
[0075] FIG. 5 A depicts an additional system architecture for analyzing the results of network attack functions and methods. According to FIG. 5A, the system architecture may comprise a web service such as an E2E security testing suit 504 that further may include an API gateway 506. The API Gateway 506 can interact with one or more network elements, the fleet management system 512 comprising one or more microservices that can interact with one or more network elements. The one or more microservices may include an Invoke upon update 514, Cloud watch logs 516, MQTT services 518, REST services 520 and the like. The network attack function permutation comprises at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an artificial intelligence analysis. For example, the network attack functions (interchangeably referred to as the threat feeds) may be fed to the attack database 530 from an external computing environment including third party data sources such as public or proprietary threat feeds. The attack configuration from the attack database 530 may be then sent to the security testing functions 508 through the dedicated connectors 510 and finally to the fleet management system 512. The output data from the fleet management system 512, may be correlated and enriched at 522 and the correlated and enriched results may be stored in the result database 524. The result database may further store analyzed results from the security testing functions 508. The analyst at 528 may then analyze the results per service data from the results database at 524 through an interactive dashboard at 526.
[0076] FIG. 5B with reference to FIG. 5A depicts a more detailed system architecture highlighting the functional components of the system. As illustrated in FIG. 5B, the system architecture service such as the E2E security testing suit 504 include the API gateway 506 that can interact with one or more network elements, the fleet management system 512. The API Gateway 506 may verify: if a schema payload is of known generic type. For example, if the schema is a Protobuf, JSON schema and the like. The API Gateway may further verify if all parameters exist, and are fine and may also verify the source such as Mutual TLS. A classification block at 546 may classify data according to incoming schema, and service received from the API Gateway.
[0077] The service definitions at 549 may be used to store service definitions for schemas such as Protobufs, JSON schemas and the like. The service definitions at 549 may be checked in order to verify that the incoming schema is matching one that already exists in the schema definitions.
[0078] Additionally, the audit log at 551 may store alerts and actions needed by an analyst. For example, if a new schema definition is found then the audit log 551 may store the schema definition. The audit log at 551 may further audit access to the VCE. [0079] Further, the dedicated payload builder at 547 may pull one or more attacks from the attacks database at 530, verify the existence of such attacks and fuzzed files in Generated Permutations at 450. The Generated Permutations at 450 may contain payloads of attacks (ready to send Protobufs, JSONs). The Generated Permutations at 450 may further perform pulling existing payloads to avoid recreating payloads and wasting time and resources, generating attack payloads such as Protobufs, JSONs and the like for any new or missing attacks and storing new payloads in Generic Permutations.
[0080] The attack database at 530 may contain attack configurations, dedicated attacks per service, declaration of fields that need to be fuzzed and fields that need to be kept as is. The attack database at 530 further may accept feeds from PT Integration Service (not shown in FIG. 5A or 5B).
[0081] The Attacks Queue by Topic SQS at 548 may store a combination of payload, endpoint, connector data but not limited to the like. Dedicated lambda connectors such as the REST services 518, Token services 553, TLS, MQTT service 558, HTTPS MTLS 561, loT Hub Connector and the like are a set of separate Lambdas that can be used to communicate with different communication endpoints in the VCE such as the Fleet Management system, services platform, OEM, and the like.
[0082] An MQTT subscriber Lambda at 554 may be invoked whenever a response in MQTT is to be expected, for example when sending a REST payload to the Services Platform as a mobile application when the vehicle needs to get some command from the user. Additionally, an enrichment Lambda at 555 may be used to get feeds from different external systems and enrich existing result information such as information from Device Platform/Service Platform CloudWatch, X-Ray, MQTT Insights, and the like.
[0083] The result database at 524 may store all attack results and insights connected to them, store enrichment information, may query the attacks stored based on timestamps and transaction IDs and supply the end feeds for the Kibana. Additionally, the interactive dashboard at 526 may be used to view alerts, view results, contains dashboards and may have classification and reporting capabilities and the like. [0084] FIGs. 6A- 6B depict example representations of operational process flow within the system architecture in the vehicular computing environment. According to FIG. 6A, the at least one attack function may utilize a communication protocol and a web service protocol but not limited to the like. The communication protocol may be full-duplex, stateless but not limited to the like while the web services protocol may be full-duplex but not limited to it. For example, the communication protocol may provide communication between the E2E testing suite 504 and the backend service fleet management system 512. Prior to establishing the communication to send commands to the fleet management system, the system may create a micro service such as an MQTT client that subscribes to all relevant topics. The Frontend Emulator (FE) 410 may craft a command payload and invoke the REST function REST PUT at 602. The REST function may return a response result which may be received from the Fleet Management System such as a HTTP 200 with Transaction ID (FID), HTTP 404, and the like. The correlation table 612 may include previously obtained correlation results that may indicate the relevance of at least one of a cross-site scripting attack, and out of range integer value, a JSON injection, an enormous field repetition, a specially crafted string, a nullbyte, an SQL injection, an illegal character, or a business logic attack. In case the REST response is positive (HTTP 200), the frontend emulator 410 may store the HD of the response in a Correlation table 612 along with the parameters of the original crafted command.
[0085] The MQTT subscriber notifies the Vehicle Emulator (VE) 416 upon receiving an MQTT message. The HD conveyed by the MQTT message is looked up in Correlation table 612. If the same HD is matched, the original command parameters are fetched for further validation from the Correlation table 612.
[0086] FIG. 6B illustrates another embodiment of the communication between the frontend and the backend services. As illustrated, the vehicle emulator 416 may craft the MQTT Publish payload, generate the Transaction ID (HD) at 604 and insert the HD at 606 into the HD field of the crafted pay load. The generated HD may be stored in the Correlation table 612 along with MQTT Publish command parameters.
[0087] The Frontend Emulator 410 may issue the REST GET request to a relevant service of the Fleet Management System to obtain the parameters published by the vehicle emulator 416 in and temporarily store in a Management System Cache 652 ( or simply referred to as cache 652). Upon getting the response, the FE 410 parses the response payload and fetches the TID. The TID may be looked up in the Correlation table. If the same TID is matched, the original MQTT Publish command parameters are fetched from the Correlation table for further validation and comparison.
[0088] FIGs. 7A-7B depict example representations of attack generation process flow within the system architecture in the vehicular computing environment. As illustrated in FIG. 7A, in an embodiment, the attack generation process flow may include utilizing a communication protocol or a web services protocol or a combination thereof and interact with at least one of a private database, a public database, or a network element-specific database. For example, at 714 to 718, attack generation process flow may include attempting to retrieve software version from HTTP header and at 720 to 724 running tests corresponding to the retrieved software version. At 726 to 730, the attack generation process flow may include seeking exploits from an exploit database that may be a database external to the vehicle computing environment while at 732 and 734, the attack generation process flow may include notifying the analyst about new exploits found, crafts new tests based on the new exploits, and updates the exploits database that may include previously obtained correlation results related to a network element. The previously obtained correlation results may indicate the relevance of at least one of a cross-site scripting attack, and out of range integer value, a JSON injection, an enormous field repetition, a specially crafted string, a nullbyte, an SQL injection, an illegal character, or a business logic attack.
[0089] FIG. 7B illustrates another embodiment, wherein at 736 and 738, the attack generation process flow may include periodically polling external Common Vulnerabilities and Exposures (CVE) databases for new vulnerabilities relevant for the system. The CVE lookup expression may be derived from the list of potentially harmful payloads types. Alternatively the CVE lookup may be triggered by a desire to investigate an anomalous network behavior anything related to bad parsing, the presence of certain packages, or new payloads, received responses or may emerge from new learnings gleaned from polling the system. For example, a CVE lookup may be triggered upon receiving a response indicating a new parser was used, or an unexpected web-server was activated. [0090] The atack generation process flow may include at 740 and 742 checking if found vulnerabilities are known by the system that may exist in a local exploits database and at 744 and 746, if vulnerabilities not found, notifying the analyst about new vulnerabilities found, crafts corresponding exploit/test and updates the local Exploits Database. Known system exploits may be held in a network connected CVE database, for example the National Vulnerability Database (NVD). Additional non-limiting examples of CVE databases include Exploits DB, Shodan, and Metasploit.
[0091] FIG. 8 illustrates a hardware platform for implementation of the system, according to an example embodiment of the present disclosure.
[0092] Over FIG. 8, the hardware platform 800 may be a computer system 800 that may be used with the examples described herein. The computer system 800 may represent a computational platform that includes components that may be in a server or another computer system. The computer system 800 may execute, by a processor (e.g., a single or multiple processors) or other hardware processing circuit, the methods, functions and other processes described herein. These methods, functions and other processes may be embodied as machine- readable instructions stored on a computer-readable medium, which may be non-transitory, such as hardware storage devices (e.g., RAM (random access memory), ROM (read-only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), hard drives, and flash memory). The computer system 800 may include a processor 805 that executes software instructions or code stored on a non-transitory computer-readable storage medium 810 to perform methods of the present disclosure. The software code includes, for example, instructions to gather information pertaining cyber anomalies and data elements in a vehicular computing environment and generate alerts, based on risk assessment of the vehicular computing environment.
[0093] The instructions on the computer- readable storage medium 810 are read and stored the instructions in storage 815 or in random access memory (RAM) 820. The storage 815 provides a large space for keeping static data where at least some instructions could be stored for later execution. The stored instructions may be further compiled to generate other representations of the instructions and dynamically stored in the RAM 820. The processor 805 reads instructions from the RAM 820 and performs actions as instructed.
[0094] The computer system 800 further includes an output device 825 to provide at least some of the results of the execution as output including, but not limited to, visual information to users, such as external agents. The output device can include a display on computing devices and virtual reality glasses or may be an interactive dashboard. For example, the display can be a mobile phone screen or a laptop screen. GUIs and/or text are presented as an output on the display screen. The computer system 800 further includes input device 830 to provide a user or another device with mechanisms for entering data and/or otherwise interact with the computer system 800. The input device may include, for example, a keyboard, a keypad, a mouse, or a touchscreen. In an example, output of any of the attach generator, the data lake, the machine learning engine may be displayed on the output device 825. Each of these output devices 825 and input devices 830 could be joined by one or more additional peripherals. In an example, the output device 825 may be used to provide alerts or display a risk assessment map of the environment.
[0095] A network communicator 835 may be provided to connect the computer system 800 to a network and in turn to other devices connected to the network including other clients, servers, data stores, and interfaces, for instance. A network communicator 835 may include, for example, a network adapter such as a LAN adapter or a wireless adapter. The computer system 800 includes a data source interface 840 to access data source 845. A data source is an information resource. As an example, a database of exceptions and rules may be a data source. Moreover, knowledge repositories and curated data may be other examples of data sources.
[0096] Those skilled in the art will appreciate that the foregoing specific exemplary processes and/or devices and/or technologies are representative of more general processes and/or devices and/or technologies taught elsewhere herein, such as in the claims filed herewith and/or elsewhere in the present application.
[0097] Those having ordinary skill in the art will recognize that the state of the art has progressed to the point where there is little distinction left between hardware, software, and/or firmware implementations of aspects of systems; the use of hardware, software, and/or firmware is generally a design choice representing cost vs. efficiency tradeoffs (but not always, in that in certain contexts the choice between hardware and software can become significant). Those having ordinary skill in the art will appreciate that there are various vehicles by which processes and/or systems and/or other technologies described herein can be effected (e.g., hardware, software, and/or firmware), and that the preferred vehicle will vary with the context in which the processes and/or systems and/or other technologies are deployed. For example, if an implementer determines that speed and accuracy are paramount, the implementer may opt for a mainly hardware and/or firmware vehicle; alternatively, if flexibility is paramount, the implementer may opt for a mainly software implementation; or, yet again alternatively, the implementer may opt for some combination of hardware, software, and/or firmware. Hence, there are several possible vehicles by which the processes and/or devices and/or other technologies described herein may be effected, none of which is inherently superior to the other in that any vehicle to be utilized is a choice dependent upon the context in which the vehicle will be deployed and the specific concerns (e.g., speed, flexibility, or predictability) of the implementer, any of which may vary.
[0098] In some implementations described herein, logic and similar implementations may include software or other control structures suitable to operation. Electronic circuitry, for example, may manifest one or more paths of electrical current constructed and arranged to implement various logic functions as described herein. In some implementations, one or more media are configured to bear a device- detectable implementation if such media hold or transmit a special-purpose device instruction set operable to perform as described herein. In some variants, for example, this may manifest as an update or other modification of existing software or firmware, or of gate arrays or other programmable hardware, such as by performing a reception of or a transmission of one or more instructions in relation to one or more operations described herein. Alternatively or additionally, in some variants, an implementation may include specialpurpose hardware, software, firmware components, and/or general-purpose components executing or otherwise controlling special-purpose components. Specifications or other implementations may be transmitted by one or more instances of tangible or transitory transmission media as described herein, optionally by packet transmission or otherwise by passing through distributed media at various times.
[0099] Alternatively or additionally, implementations may include executing a specialpurpose instruction sequence or otherwise operating circuitry for enabling, triggering, coordinating, requesting, or otherwise causing one or more occurrences of any functional operations described above. In some variants, operational or other logical descriptions herein may be expressed directly as source code and compiled or otherwise expressed as an executable instruction sequence. In some contexts, for example, C++ or other code sequences can be compiled directly or otherwise implemented in high-level descriptor languages (e.g., a logic- synthesizable language, a hardware description language, a hardware design simulation, and/or other such similar modes of expression). Alternatively or additionally, some or all of the logical expression may be manifested as a Verilog-type hardware description or other circuitry model before physical implementation in hardware, especially for basic operations or timing-critical applications. Those skilled in the art will recognize how to obtain, configure, and optimize suitable transmission or computational elements, material supplies, actuators, or other common structures in light of these teachings.
[0100] The foregoing detailed description has set forth various embodiments of the devices and/or processes via the use of block diagrams, flowcharts, and/or examples. Insofar as such block diagrams, flowcharts, and/or examples contain one or more functions and/or operations, it will be understood by those having ordinary skill in the art that each function and/or operation within such block diagrams, flowcharts, or examples can be implemented, individually and/or collectively, by a wide range of hardware, software, firmware, or virtually any combination thereof. In one embodiment, several portions of the subject matter described herein may be implemented via Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), digital signal processors (DSPs), or other integrated formats. However, those skilled in the art will recognize that some aspects of the embodiments disclosed herein, in whole or in part, can be equivalently implemented in integrated circuits, as one or more computer programs running on one or more computers (e.g., as one or more programs running on one or more computer systems), as one or more programs running on one or more processors (e.g., as one or more programs running on one or more microprocessors), as firmware, or as virtually any combination thereof, and that designing the circuitry and/or writing the code for the software and or firmware would be well within the skill of one of skill in the art in light of this disclosure. In addition, those skilled in the art will appreciate that the mechanisms of the subject matter described herein are capable of being distributed as a program product in a variety of forms, and that an illustrative embodiment of the subject matter described herein applies regardless of the particular type of signal bearing medium used to actually carry out the distribution. Examples of a signal bearing medium include, but are not limited to, the following: a recordable type medium such as a USB drive, a solid state memory device, a hard disk drive, a Compact Disc (CD), a Digital Video Disk (DVD), a digital tape, a computer memory, etc.; and a transmission type medium such as a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communications link, a wireless communication link (e.g., transmitter, receiver, transmission logic, reception logic, etc.), etc.).
[0101] In a general sense, those skilled in the art will recognize that the various aspects described herein which can be implemented, individually and/or collectively, by a wide range of hardware, software, firmware, and/or any combination thereof can be viewed as being composed of various types of “electrical circuitry.” Consequently, as used herein “electrical circuitry” includes, but is not limited to, electrical circuitry having at least one discrete electrical circuit, electrical circuitry having at least one integrated circuit, electrical circuitry having at least one application specific integrated circuit, electrical circuitry forming a general purpose computing device configured by a computer program (e.g., a general purpose computer configured by a computer program which at least partially carries out processes and/or devices described herein, or a microprocessor configured by a computer program which at least partially carries out processes and/or devices described herein), electrical circuitry forming a memory device (e.g., forms of memory (e.g., random access, flash, read-only, etc.)), and/or electrical circuitry forming a communications device (e.g., a modem, communications switch, optical-electrical equipment, etc.). Those having ordinary skill in the art will recognize that the subject matter described herein may be implemented in an analog or digital fashion or some combination thereof.
[0102] Those skilled in the art will recognize that at least a portion of the devices and/or processes described herein can be integrated into a data processing system. Those having ordinary skill in the art will recognize that a data processing system generally includes one or more of a system unit housing, a video display device, memory such as volatile or non-volatile memory, processors such as microprocessors or digital signal processors, computational entities such as operating systems, drivers, graphical user interfaces, and applications programs, one or more interaction devices (e.g., a touch pad, a touch screen, an antenna, etc.), and/or control systems including feedback loops and control motors (e.g., feedback for sensing position and/or velocity; control motors for moving and/or adjusting components and/or quantities). A data processing system may be implemented utilizing suitable commercially available components, such as those typically found in data computing/communi cation and/or network computing/communication systems.
[0103] In certain cases, use of a system or method as disclosed and claimed herein may occur in a territory even if components are located outside the territory. For example, in a distributed computing context, use of a distributed computing system may occur in a territory even though parts of the system may be located outside of the territory (e.g., relay, server, processor, signalbearing medium, transmitting computer, receiving computer, etc. located outside the territory).
[0104] A sale of a system or method may likewise occur in a territory even if components of the system or method are located and/or used outside the territory.
[0105] Further, implementation of at least part of a system for performing a method in one territory does not preclude use of the system in another territory.
[0106] All of the above U.S. patents, U.S. patent application publications, U.S. patent applications, foreign patents, foreign patent applications and non-patent publications referred to in this specification and/or listed in any Application Data Sheet, are incorporated herein by reference, to the extent not inconsistent herewith.
[0107] One skilled in the art will recognize that the herein described components (e.g., operations), devices, objects, and the discussion accompanying them are used as examples for the sake of conceptual clarity and that various configuration modifications are contemplated. Consequently, as used herein, the specific examples set forth and the accompanying discussion are intended to be representative of their more general classes. In general, use of any specific example is intended to be representative of its class, and the non-inclusion of specific components (e.g., operations), devices, and objects should not be taken to be limiting.
[0108] With respect to the use of substantially any plural and/or singular terms herein, those having ordinary skill in the art can translate from the plural to the singular or from the singular to the plural as is appropriate to the context or application. The various singular/plural permutations are not expressly set forth herein for sake of clarity. [0109] The herein described subject matter sometimes illustrates different components contained within, or connected with, different other components. It is to be understood that such depicted architectures are presented merely as examples, and that in fact many other architectures may be implemented which achieve the same functionality. In a conceptual sense, any arrangement of components to achieve the same functionality is effectively “associated” such that the desired functionality is achieved. Therefore, any two components herein combined to achieve a particular functionality can be seen as “associated with” each other such that the desired functionality is achieved, irrespective of architectures or intermedial components. Likewise, any two components so associated can also be viewed as being “operably connected,” or “operably coupled,” to each other to achieve the desired functionality, and any two components capable of being so associated can also be viewed as being “operably couplable,” to each other to achieve the desired functionality. Specific examples of “operably couplable” include but are not limited to physically mateable or physically interacting components, wirelessly interactable components, wirelessly interacting components, logically interacting components, or logically interactable components.
[0110] In some instances, one or more components may be referred to herein as “configured to,” “configurable to,” “operable/operative to,” “adapted/adaptable,” “able to,” “conformable/conformed to,” etc. Those skilled in the art will recognize that “configured to” can generally encompass active-state components, inactive-state components, or standby-state components, unless context requires otherwise.
[0111] While particular aspects of the present subject matter described herein have been shown and described, it will be apparent to those skilled in the art that, based upon the teachings herein, changes and modifications may be made without departing from the subject matter described herein and its broader aspects and, therefore, the appended claims are to encompass within their scope all such changes and modifications as are within the true spirit and scope of the subject matter described herein. It will be understood by those within the art that, in general, terms used herein, and especially in the appended claims (e.g., bodies of the appended claims) are generally intended as “open” terms (e.g., the term “including” should be interpreted as “including but not limited to,” the term “having” should be interpreted as “having at least,” the term “includes” should be interpreted as “includes but is not limited to,” etc.). It will be further understood by those within the art that if a specific number of an introduced claim recitation is intended, such an intent will be explicitly recited in the claim, and in the absence of such recitation no such intent is present. For example, the following appended claims may contain usage of the introductory phrases “at least one” and “one or more” to introduce claim recitations. However, the use of such phrases should not be construed to imply that the introduction of a claim recitation by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim recitation to claims containing only one such recitation, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an” (e.g., “a” or “an” should typically be interpreted to mean “at least one” or “one or more”); the same holds true for the use of definite articles used to introduce claim recitations. In addition, even if a specific number of an introduced claim recitation is explicitly recited, those skilled in the art will recognize that such a recitation should typically be interpreted to mean at least the recited number (e.g., the bare recitation of “two recitations,” without other modifiers, typically means at least two recitations, or two or more recitations). Furthermore, in those instances where a convention analogous to “at least one of A, B, and C, etc.” is used, in general such a construction is intended in the sense one having ordinary skill in the art would understand the convention (e.g., “a system having at least one of A, B, and C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). In those instances where a convention analogous to “at least one of A, B, or C, etc.” is used, in general such a construction is intended in the sense one having ordinary skill in the art would understand the convention (e.g., “a system having at least one of A, B, or C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). It will be further understood by those within the art that typically a disjunctive word or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms unless context dictates otherwise. For example, the phrase “A or B” will be typically understood to include the possibilities of “A” or “B” or “A and B.”
[0112] With respect to the appended claims, those skilled in the art will appreciate that recited operations therein may generally be performed in any order. Also, although various operational flows are presented as sequences of operations, it should be understood that the various operations may be performed in other orders than those which are illustrated, or may be performed concurrently. Examples of such alternate orderings may include overlapping, interleaved, interrupted, reordered, incremental, preparatory, supplemental, simultaneous, reverse, or other variant orderings, unless context dictates otherwise. Furthermore, terms like “responsive to,” “related to,” or other past-tense adjectives are generally not intended to exclude such variants, unless context dictates otherwise.
[0113] While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.

Claims

What we claim is:
1. A method of analyzing the results of a network attack function within a vehicular computing environment including two or more network elements each with at least one known parameter, the method comprising: a. executing one or more network attack functions against two or more known network elements, wherein the one or more network attack functions includes a set of attack function permutations; b. analyzing results of at least one network attack function to identify anomalous behavior of at least one network element; and c. correlating the identified anomalous behavior of the at least one network element with a specific network attack function permutation and with at least one parameter of the specific network element.
2. The method of claim 1, wherein at least one of the network element of the plurality of network elements comprises a single device, a plurality of devices, one or more network nodes, one or more databases, one or more lines of computer code, one or more processors, one or more communications elements, or one or more memory elements.
3. The method of claim 1, wherein the plurality of network elements are simulated network elements that reside on a simulated vehicular computing environment.
4. The method of claim 1, wherein the plurality of network elements are emulated network elements that reside on an emulated vehicular computing environment.
5. The method of claim 1, wherein the plurality of network elements reside on a physical network.
6. The method of claim 1, wherein the plurality of network elements reside on a hybrid environment, wherein the hybrid environment comprises at least a combination of at least two of a physical network elements, simulated network elements, or emulated network elements.
7. The method of claim 1 , wherein the plurality of network elements includes an infrastructure monitoring service that can interact with one or more network elements.
32 The method of claim 1, wherein at least one parameter of a specific network element is stored in a database. The method of claim 1, wherein at least one parameter of a specific network element is used for further system validation. The method of claim 1, wherein the plurality of network elements includes at least one backend service. The method of claim 1, wherein the plurality of network elements includes at least one web service. The method of claim 1, wherein the plurality of network elements includes at least one mobile device platform. The method of claim 1, wherein the plurality of network elements includes at least one messaging service that can interact with one or more network elements. The method of claim 1, wherein the plurality of network elements includes a compute service that can interact with one or more network elements. The method of claim 1, wherein the plurality of network elements includes an authentication service that can interact with one or more network elements. The method of claim 1 , wherein the vehicular computing environment is integrated with an external computing environment. The method of claim 10, wherein the backend service is a fleet management service. The method of claim 10, wherein the backend service is hosted by one or more cloud services providers. The method of claim 10, wherein the backend service is hosted using an on-premises hosting solution. The method of claim 10, wherein the backend service is hosted using a combination of one or more cloud service providers and an on-premises hosting solution. The method of claim 11, wherein the web service is hosted by one or more cloud services providers. The method of claim 11, wherein the web service is hosted using an on-premises hosting solution. The method of claim 11, wherein the web service is hosted using a combination of one or more cloud service providers and an on-premises hosting solution.
33 The method of claim 11, wherein the web service includes an API gateway that can interact with one or more network elements. The method of claim 11, wherein the web service one or more microservices that can interact with one or more network elements. The method of claim 12, wherein the at least one a mobile device platform includes an iOS application or an Android application. The method of claim 13 , wherein the messaging service includes at least one of a messaging client, persistent connection, a central messaging broker, or a polling interval. The method of claim 14, wherein the compute service is a serverless compute service that can interact with one or more network elements. The method of claim 15, wherein the authentication service is a mutual authentication service that can interact with one or more network elements. The method of claim 16, further comprising connection with an external computing environment. The method of claim 16, wherein the external computing environment is part of a developer operations environment associated with continuous integration. The method of claim 16, wherein the external computing environment is part of a developer operations environment associated with continuous delivery. The method of claim 16, wherein the external computing environment is part of a developer operations environment associated with continuous deployment. The method of claim 1, wherein the executed network attack function permutation comprises at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an artificial intelligence analysis. The method of claim 1, wherein the at least one attack function permutation comprises a logical addresses for each of the plurality of network elements. The method of claim 1, wherein the at least one attack function permutation comprises at least one characteristic for each of the plurality of network elements. The method of claim 1, wherein the at least one attack function permutation comprises at least one of a duration of time to form at least one attack function, a predicted run time to execute at least one attack function, a requirement to comply with a performance specification of an attack function, or an attack function network route. The method of claim 1, wherein the at least one attack function is initiated via a batch process. The method of claim 1, wherein the at least one attack function is initiated via a near-real time streaming process. The method of claim 1, wherein the at least one attack function utilizes a messaging protocol. The method of claim 1, wherein the at least one attack function is targeting a frontend emulator. The method of claim 1, wherein the at least one attack function is based at least in part on a previously derived attack function permutation. The method of claim 1, wherein the at least one attack function is based at least in part on a previously executed attack function permutation. The method of claim 1, wherein the at least one attack function permutations further comprises one or more attack payloads. The method of claim 1, wherein the network attack function was created by an artificial intelligence system. The method of claim 1, wherein the at least one executed network attack function is executed against a plurality of network elements at the application layer. The method of claim 1, wherein the network attack function was created by a human operator. The method of claim 1, wherein the network attack function was created by combination of an artificial intelligence system and a human operator. The method of claim 1, wherein the network attack function includes information obtained from an external computing environment including third party data sources. The method of claim 1, wherein the network attack function includes randomly generated information. The method of claim 1, wherein the at least one attack function utilizes a communication protocol. The method of claim 1, wherein the at least one attack function utilizes a web services protocol. The method of claim 1, wherein the at least one attack function permutation comprises interaction with at least one of a private database, a public database, or a network elementspecific database. The method of claim 1, wherein the at least one attack function permutation is at least partially informed by previously obtained correlation results related to a network element. The method of claim 51, wherein the communication protocol is full-duplex. The method of claim 51, wherein the communication protocol is stateless. The method of claim 52, wherein the web services protocol is full-duplex. The method of claim 52, wherein the web services protocol provides identity verification through intermediaries. The method of claim 52, wherein the web services protocol provides point-to-point identity verification. The method of claim 53, wherein the interaction includes at least one each of a read function and a write function with at least one of a private database, a public database, or a network element-specific database. The method of claim 54, wherein the previously obtained correlation results indicates the relevance of at least one of a cross-site scripting attack, and out of range integer value, a JSON injection, an enormous field repetition, a specially crafted string, a nullbyte, an SQL injection, an illegal character, or a business logic attack. The method of claim 1, wherein analyzing results of at least one attack function comprises at least one of a manual request from a human, an automated request according to a request schedule, an automated request generated by machine learning, and an automated request generated by artificial intelligence analysis. The method of claim 1, wherein analyzing the results of at least one attack function includes the use of an artificial intelligence system. The method of claim 1, wherein analyzing the results of at least one attack function includes the use of a supervised learning operation.
36 The method of claim 1, wherein analyzing results of at least one attack function includes a user interface adapted for visual analysis by a human operator. The method of claim 1 , wherein analyzing results of at least one attack function includes analysis by an artificial intelligence system and approval by a human operator. The method of claim 1 , wherein the analyzing results of at least one attack function includes analysis by a human operator and an artificial intelligence algorithm. The method of claim 1, wherein analyzing results of at least one attack function includes using results from previously analysis sessions. The method of claim 1 , wherein the analyzing results of at least one attack function includes transmitting the analysis results to one or more network elements within the vehicular computing environment. The method of claim 1 , wherein the analyzing results of at least one attack function includes transmitting the analysis results to a network element located in an external computing environment. The method of claim 1, wherein analyzing results of at least one attack function includes storing the analysis results within one or more network elements located in the vehicular computing environment. The method of claim 1 , wherein analyzing results of at least one attack function includes storing the analysis results in a network element located in an external computing environment. The method of claim 1, wherein correlating the identified anomalous behavior includes the usage of an artificial intelligence system. The method of claim 1, wherein correlating the identified anomalous behavior includes an artificial intelligence algorithm. The method of claim 1, wherein correlating the identified anomalous behavior is performed by a human operator. The method of claim 1, wherein correlating the identified anomalous behavior includes the use of a set of predefined and updatable rules to detect anomalous behavior. The method of claim 1, wherein correlating the identified anomalous behavior is performed by a human operator aided by an artificial intelligence system.
37 The method of claim 1, wherein correlating the identified anomalous behavior is performed by a human operator and an artificial intelligence algorithm. The method of claim 1, wherein correlating the identified anomalous behavior includes previously obtained correlation results. The method of claim 1, wherein correlating the identified anomalous behavior includes transferring the results of the correlation activity to one or more network elements within a vehicular computing environment. The method of claim 1, wherein correlating the identified anomalous behavior includes transferring the results of the correlation activity to an external computer network. The method of claim 1, wherein correlating the identified anomalous behavior includes storing the results of the correlation activity to one or more network elements within the vehicular computing environment. The method of claim 1, wherein correlating the identified anomalous behavior includes storing the results of the correlation activity to an external computer network. The method of claim 1, wherein correlating the identified anomalous behavior includes sending the results of the correlation activity to an exploits database. The method of claim 1, wherein correlating the identified anomalous behavior includes correlating the original attack generator request with the identified anomalous behavior. The method of claim 1, wherein correlating the identified anomalous behavior includes correlating the original request from the backend service with the identified anomalous behavior. The method of claim 1, wherein correlating the identified anomalous behavior includes correlating a network attack function targeting a backend service with the identified anomalous behavior. The method of claim 1, wherein correlating the identified anomalous behavior includes correlating a network attack function targeting a web service with the identified anomalous behavior. The method of claim 1, wherein correlating the identified anomalous behavior includes correlating a network attack function targeting a mobile device platform with the identified anomalous behavior.
38 The method of claim 1, wherein correlating the identified anomalous behavior includes correlating a network attack function targeting a messaging service with the identified anomalous behavior. The method of claim 1, wherein correlating the identified anomalous behavior includes correlating a network attack function targeting an authentication service with the identified anomalous behavior. The method of claim 1, wherein correlating the identified anomalous behavior includes correlating a network attack function targeting a compute service with the identified anomalous behavior. The method of claim 1, wherein correlating the identified anomalous behavior includes sending the results of the correlation activity to an attack function generator. The method of claim 1, wherein correlating the identified anomalous behavior includes correlating at least one known exploit from an exploits database with the identified anomalous behavior. The method of claim 93 wherein sending the results of the correlation activity to an attack function generator results in the generation of an additional attack function permutation. The method of claim 94 when the exploits database is an database external to the vehicle computing environment.
39
PCT/IL2022/051065 2021-10-08 2022-10-06 Methods and systems of correlating network attacks with network element behavior WO2023058026A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202163253577P 2021-10-08 2021-10-08
US63/253,577 2021-10-08

Publications (1)

Publication Number Publication Date
WO2023058026A1 true WO2023058026A1 (en) 2023-04-13

Family

ID=85803994

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2022/051065 WO2023058026A1 (en) 2021-10-08 2022-10-06 Methods and systems of correlating network attacks with network element behavior

Country Status (1)

Country Link
WO (1) WO2023058026A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170223037A1 (en) * 2016-01-29 2017-08-03 Acalvio Technologies, Inc. Using high-interaction networks for targeted threat intelligence
US20190044912A1 (en) * 2018-03-30 2019-02-07 Intel Corporation Anomaly detection in a controller area network
US20190111863A1 (en) * 2014-01-06 2019-04-18 Argus Cyber Security Ltd. Os monitor
WO2020261262A1 (en) * 2019-06-24 2020-12-30 Cymotive Technologies Ltd. Systems and methods for assessing risk in networked vehicle components
WO2021034906A1 (en) * 2019-08-19 2021-02-25 Q Networks, Llc Methods, systems, kits and apparatuses for providing end-to-end, secured and dedicated fifth generation telecommunication
US20210067553A1 (en) * 2019-09-04 2021-03-04 Oracle International Corporation Honeypots for infrastructure-as-a-service security
US20210281590A1 (en) * 2020-03-04 2021-09-09 Mcafee, Llc Device Anomaly Detection

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190111863A1 (en) * 2014-01-06 2019-04-18 Argus Cyber Security Ltd. Os monitor
US20170223037A1 (en) * 2016-01-29 2017-08-03 Acalvio Technologies, Inc. Using high-interaction networks for targeted threat intelligence
US20190044912A1 (en) * 2018-03-30 2019-02-07 Intel Corporation Anomaly detection in a controller area network
WO2020261262A1 (en) * 2019-06-24 2020-12-30 Cymotive Technologies Ltd. Systems and methods for assessing risk in networked vehicle components
WO2021034906A1 (en) * 2019-08-19 2021-02-25 Q Networks, Llc Methods, systems, kits and apparatuses for providing end-to-end, secured and dedicated fifth generation telecommunication
US20210067553A1 (en) * 2019-09-04 2021-03-04 Oracle International Corporation Honeypots for infrastructure-as-a-service security
US20210281590A1 (en) * 2020-03-04 2021-09-09 Mcafee, Llc Device Anomaly Detection

Similar Documents

Publication Publication Date Title
Baykara et al. A novel honeypot based security approach for real-time intrusion detection and prevention systems
US10574698B1 (en) Configuration and deployment of decoy content over a network
US11729193B2 (en) Intrusion detection system enrichment based on system lifecycle
Wang et al. ThingPot: an interactive Internet-of-Things honeypot
US20170230336A1 (en) Automated honeypot provisioning system
Nazir et al. Survey on wireless network security
US9971891B2 (en) Methods, systems, and media for detecting covert malware
US9838419B1 (en) Detection and remediation of watering hole attacks directed against an enterprise
US10419452B2 (en) Contextual monitoring and tracking of SSH sessions
US10805340B1 (en) Infection vector and malware tracking with an interactive user display
CN111400722A (en) Method, apparatus, computer device and storage medium for scanning small program
US20230370439A1 (en) Network action classification and analysis using widely distributed honeypot sensor nodes
US20230362142A1 (en) Network action classification and analysis using widely distributed and selectively attributed sensor nodes and cloud-based processing
Haseeb et al. A measurement study of iot-based attacks using iot kill chain
Shi et al. Analysis of web security comprehensive evaluation tools
Zeinali Analysis of security information and event management (SIEM) evasion and detection methods
WO2023058026A1 (en) Methods and systems of correlating network attacks with network element behavior
Melón et al. Eve and adam: situation awareness tools for nato ccdcoe cyber exercises
Huang Human-centric training and assessment for cyber situation awareness
Sombatruang et al. Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure {IoT}
Balzarotti Testing network intrusion detection systems.
Sobesto Empirical studies based on honeypots for characterizing attackers behavior
Elsbroek et al. Fidius: Intelligent support for vulnerability testing
La Security monitoring for network protocols and applications
Kaur et al. Study of network security along with network security tools and network simulators

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22878089

Country of ref document: EP

Kind code of ref document: A1